Hi again! In this blog, I have reversed a malware containing LummaC2 stealer. Basic Analysis First, let’s analyse the malware on VirusTotal SHA-256 of the file is: c5fd4ee7fef2655...
Reversing LummaC2 Stealer
BackdoorCTF'24 Writeup
Reversing/ GoBlind Description: This binary hides its secrets deep within. Can you untangle the layers and reveal the secret? File : file Writeup This challenge was written in GoLang. Execu...
Piping Process In Shell
Hey everyone! Welcome back to my blog series. Recently, I’ve been dedicating time to my basic my-shell project, where I’m working on implementing a shell in C++. While doing so, I got stuck in addi...
CPU Scheduling
Hey everyone! This article is about how CPU schedules the processes and executes them, covering various scheduling algorithms. It consists of my notes which I prepared while studying this topic fro...
BackdoorCTF'23 Writeups
I’m sharing writeups for the challenges I created for Backdoor CTF’23, hosted by InfoSecIITR. Here they are :- Forensics/Headache Description:- I’ve had a headache since last evening. Is there a...
Networking - Part 2
Welcome to the other part of Computer Networking. In this part, we’ll be exploring the protocols involved in networking. HTTP HTTP stands for Hypertext Tranfer Protocol. It can be defined as the ...
Networking - Part 1
Hey everyone! This blog covers the basics of computer networking. So let’s start with the fundamental question… Exactly what is a computer network? It’s a network of two or more two devices exchang...
CSAW'23 Quals
I had the privilege of participating in the CSAW’23 Quals CTF as a member of InfosecIITR, and it proved to be a great experience. I am delighted to share the writeups for the reversing challenges m...
SekaiCTF 2023 - DEFCON Invitation
Description:- As you all know, DEF CON CTF Qualifier 2023 was really competitive and we didn’t make it. Surprisingly, 2 months before the finals in Las Vegas, we received an official invitation fro...