Skip to content

sertaac/Lab-Practices

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

49 Commits
 
 
 
 
 
 

Repository files navigation

This is my main laboratory for Cyber Security Practices.

Repository Structure

1. Reverse Engineering on CrackMes

Solutions, analysis scripts, and detailed write-ups for "crackme" challenges from crackmes.one.

  • 1 - 2 Difficulty:

    • Fundamental reverse engineering concepts.
    • Techniques include basic static analysis (Ghidra), dynamic analysis (GDB, ltrace), memory inspection, and handling ASLR/PIE protections.
  • 2 - 3 Difficulty:

    • Focuses on intermediate reverse engineering tasks.
    • Techniques involve "Keygening" (writing custom key generators), algorithm reversing, and unpacking binaries.

2. Hardware Practices

Practical hardware security stuff like BIOS dumping and firmware analysis.

  • SPI Flash & BIOS Chips: Projects involving dumping and analyzing BIOS firmware, such as the Macronix MX25L6473E chip.

Tools & Environment

The analyses are made by using these tools:

  • Disassemblers/Decompilers: Ghidra
  • Debuggers: GDB (GNU Debugger)
  • Binary Analysis: strings, ltrace, strace, readelf, binwalk, UEFITool
  • Scripting: Python

About

I share my cyber security practices here.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages