Profile cover photo
Profile photo
Aneesh Dogra
757 followers -
Software Developer
Software Developer

757 followers
About
Aneesh Dogra's posts

Post has attachment
Cornelius1 was an easy crypto question in hack.lu ctf Please find Cthulhu’s magic here. Attachment: server.rb P.S.: flag is the content of the file and is not in flagformat! So, lets open up the server source and look at what its doing. require 'openssl'…

Post has attachment
I participated in the recent Scripting Challenge hosted by Byld. Palash made a nice rev question, which could be solved using z3, so here it is. Let’s try opening up the binary in IDA. The function checkUser2 is of most importance. Its used to check the…

Post has attachment
ez_pz In educational system 6.0 most students lost track with the newest developments in cyber security. This cyber course teaches the basics of cyber exploiting which are essential to get a job in the cyber business. Do this cyber hack now! ez_pz was an…

Hello people. I am looking for full-time Computer Security related jobs in USA, Singapore, UK, and Netherlands. If anyone of you can recommend me for such a position, I'll be very thankful. Thanks!


Post has attachment
Its simple. Just hack it. So we have a standard login page. Nothing special happening. If you enter admin:admin, you get an error message. It says User not found. So let’s try to brute this with a common wordlist: import requests import os import  Queue…

Post has attachment
GameTime was an easy windows rev task. The challenge is a game which asks you to press keys on demand. It gives you around 0x14 milliseconds to enter the key. Lets fire up olly and first look for all referenced text strings – its always a nice starting…

Post has attachment
Tutorial was an easy pwn in CSAW CTF 2016, worth 200 points. Ok sport, now that you have had your Warmup, maybe you want to checkout the Tutorial. Download the challenge from here. By passing it to the file command we get it know its a 64bit ELF. ldd…

Post has attachment
Given an ELF binary, you can use tools like Radare2 (open-source equivalent of IDA Pro) to try and understand what the binary consists of and what could exactly happen when you execute it. This is commonly known as Reversing. Understanding what these…

Post has shared content

Post has shared content
Join us on Tuesday, October 27 at 1:15p PT for a conversation about online security and the value of encryption. We’ll talk about how encryption is used, why it matters, and how it works. 

Our host will be Jess Hemerly, Public Policy Manager at Google. She’ll be joined by guest Stephan Somogyi, a security expert at Google.

Ask your question in the comments and through the Q&A app during the live broadcast. 
Wait while more posts are being loaded