Understanding ARM dissassembly
Introduction When you compile C code for an ARM microcontroller, the compiler translates your high-level code into machine instructions. Reverse engineering tools like Binary Ninja, Ghidra, radare2, etc. can decompile those instructions back into pseudo-C code. This guide shows you how to read that decompiled output and understand what’s happening at the hardware level. The Example: STM32 LED Blink We’ll use a simple LED blink program for an STM32F103xx (ARM Cortex-M3) microcontroller, that I have published in another repo: https://github.com/Flock137/stm32_blinky_baremetal ...
How to recover deleted files on usb or memory card
TLDR Stop using both the usb and memory card at once. Else, it will be next to impossible to recover anything back, since the data cells got overwritten, instead of just being “unlisted”. On Window (Linux), you can just install Recuva (extundelete or fatcat) for free and point the app to your usb or memory card, you’re welcome. However, I would still prefer a more sure-fire way to preserve my data, hence the blog. ...
Snyk's Fetch-the-flag Write-up (Forensics)
Void Step How many decoy hosts are randomized in this recon evasion technique Answer: 12 In Wireshark filter: (tcp.flags.syn == 1 && tcp.flags.ack == 0 ) && (ip.dst == 192.168.1.27) Explaination: Destination IP is found through manual inspection. For faster port scanning, we (or the attacker) perform the half-open scan, where SYN=1, ACK=0 (means: send only, no need response). Go to Statistics > Endpoints > IPv4, count the addresses, then minus 1 (the destination address, which we need to exclude). ...
Failed attempt on performing Hardware Forensics (STM32)
Introduction I chose to start my hardware hacking journey with an attempt to live debugging a piece of hardware. As I am waiting for the necessary parts I need to arrive, I did some emulations of the STM32, so I might have the binary ready to flash the binary into the hardware by the times the parts arrive. As weird as it is to write about a failed attempt on a blog post, this is written to at least temporary record what I did, for potential future references. The code for this attempt would not be released, as I definitely do not want to embarrase myself. ...
Setting up a stable Arch-based Penetration Testing environment
Intro This is actually my thought process of making this script https://github.com/Flock137/EOSxBlackArch, where I put the BlackArch repo on top of EndeavourOS for a quick Arch pentest environment, since BlackArch is a bit of a hassle for installing quickly. I hope it would help you in the case you wanna make an automation script yourself someday. First and foremost Install EndeavourOS. We will port our BlackArch repo into right after the former’s installation finish. ...
ai_gon3_r0ug3 Writeup
Introduction This is a Private CTF organized under the collaboration between HackerOne and HackTheBox that focus only on the AI category. Re-car AI You have been tasked with pentesting the largest used car listing website in your area. They have recently implemented an AI chatbot in their listing page to help users with common questions. The website’s policy is not to disclose the seller’s information unless the user is logged in. Can you find a way to bypass the filters and reveal the seller’s phone number by asking the chatbot? Flag format: HTB{xxx-xxxx-xxx} ...
Girls-in-CTF Writeup - Forensics & AI
Introduction To encourage and celebrate women/girls in cyber security, Re:Hack has organized this girls-only-CTF. As a woman, I really appreciate this effort and it feels incredibly inspiring. This is the first time that myself see so many girls and women gather in one place and all are incredibly passionate about this very technical field. So, I would like to give a very special thank-you to the organizers and all the challenge writers involved to make this sort of event possible. ...
ScriptCTF Writeup - Forensics
pdf (Author: Connor Chang) Description: so sad cause no flag in pdf The challenge attachment can be found here: https://github.com/scriptCTF/scriptCTF2025-OfficialWriteups/blob/main/Forensics/pdf/attachments/challenge.pdf For this challenge, you can open up Firefox to view the hint in the given PDF, but for this approach, we won’t need to use it. All we have to do is using binwalk binwalk -e challenge.pdf In the extracted folder, click on (or cat) the text file (11B or something similar), the flag is in there ...
How did I repair an (Arch) Linux bootloader twice
Introduction: Updating BIOS, got Linux overwritten After I updated my BIOS, it happened to auto turn on secure boot, bitlocker again and overwrite the bootloader on my Linux partition on a separated disk. Not to mention, I no longer see my systemd bootloader screen. Disable bitlocker key To disable bitlocker key (not decrypt the whole drive), so the windows partition won’t ask you bitlocker password over and over again when you dual-boot: ...
Recover corrupted USB in Linux terminal (required complete data wipe)
Step 1 lsblk The USB would likely to be something like sda or sdb (the same name with number is a partition). The easiest way to figure out which is your thumb drive is the size. Step 2 If the system mount any of your partition, you need to unmount them first before wiping. # Replace sdX1 with your actual partition identifier (e.g., sdb1) sudo umount /dev/sdX1 Step 3 Use wipefs command to completely erase all partition tables and filesystem signatures from the drive. ...