technology
-
I recently started learning binary exploitation (pwn), and this challenge introduced me to several key concepts. I found it particularly interesting, so I wrote this blog post to explore the details more deeply and solidify my understanding. Table of contents Introduction Opening up the binary in binaryninja, we go through the code to find the…
-
What is an LLM An LLM is a model trained on a large amount of data to predict and generate text, as well as understand words and sentences in context. Some definitions of LLM lingo Transformer: A deep learning architecture based on the ‘attention’ mechanism that determines the importance of each component (e.g., words) in…
-
Back in September 2024, I went to Hexacon. This is a security conference organized by Synacktiv, mostly focused on reverse engineering and vulnerability researching.This year’s sponsors were, but not limited to: This is the time when major companies and independent security researchers present their discoveries, whether from this year or the previous one. Some highlight…
-
Privilege escalation on Windows through a card printer software CVE-2024-34329 Back in May, I was playing around with a card printer software I had previously installed on my laptop for a security workshop my company had organized to demonstrate how easy it is to clone another company’s employee badge. On Windows, it is possible to…
