Langsung ke konten utama

Postingan

Unggulan

Day 20 - Peeking Under the Hood: An Introduction to Reverse Engineering

What's up, fellow cyber adventurers! It's Day 20 of our 30-day challenge, and after an intense couple of weeks with CTFs, crypto, and hacking fundamentals, it's time to venture into a topic that sounds like it's straight out of a spy movie: Reverse Engineering . Honestly, the name itself is pretty cool, right? It makes you think of taking apart some high-tech gadget to see how it works. And you know what? That's not far from the truth, except we'll be doing it with software. So, What Exactly is Reverse Engineering? In the simplest terms, reverse engineering (often abbreviated as 'RE') is the process of taking something apart to see how it works. In the world of cybersecurity, we're usually talking about deconstructing a piece of software or a digital file when we don't have the source code. Think of it like being given a slice of a secret-recipe cake and trying to figure out all the ingredients and the baking instructions just by examinin...

Postingan Terbaru

Day 19 - Hands on in real CTF Event - IERAE CTF 2025

Day 18 - Exploring the Cryptography Behind Web3, ECC and Its Threats

Day 17 - How Trust Works on the Internet - Digital Signatures PKI

Day 16 - The Three Pillars of Security - Confidentiality, Integrity, and Availability

Day 15 - Back to Hack The Box with "Primed for Action"

Day 14 - My First Hack The Box Challenge - "Evaluative"

Day 13 - Confronting Hard Crypto Challanges in PicoCTF

Day 12 - Leveling Up with picoCTF's Medium Crypto Challenges

Week 2 Session 1 Task - A Deep Dive into ICS/SCADA Security and Attacks

Week 2 Session 2 Task - [Linux Hardening] Information Security Lab: Implementing DAC, MAC, and RBAC