Techblog and Security


RE: DC-932L Hacking a Webcam Part 1 – Getting a Shell

Introduction and Story I remember, more then a year ago I watched this fantastic video from stacksmashing about reverse engineering and rebuilding a custom firmware for a webcam. I was absolutely stunned that this is possibile and thought about to try this some time on a device I have at home. As usual, time passes

Things I wanted to know before I started with Buffer Overflows

Entry This Post is about different issues and challenging moments I encountered during my learning experience with Buffer Overflows and wished I knew before. This is not a guide how BOFs are working or how to learn this topic. Very imported, watch these two videos from LiveOverflow, these will really save you some time if

NTLM Attack in Metabase CVE-2022-24853

Metabase GeoJSON API Endpoint Back in September 2021, Metabase released a security announcement regarding its GeoJSON API endpoint: GeoJSON URL validation can expose server files and environment variables to unauthorized users We’ve discovered a potential security issue with the custom GeoJSON map (admin->settings->maps->custom maps->add a map) support and potential local file inclusion (including environment variables).

pwntools, gdb, gdbserver and pwndbg with 32 bit binaries

A few weeks ago i just started with binary exploitation and as learning and understanding this topic is not enough challenging, i encountered different problems with the tools and some basics. One of these problems i will describe today. Intro there are many good tutorials, challanges and ctfs out there, where you can start learning

gMSA Passwords

Doing one of the recent HTB Boxes i came across the tool and learned how you can retrieve gMSA passwords with it: Additional to the howto from NetTools you can change the encoding for the desired attribute to only retrieve the current password this will print you only the current password as hex