Pointers are a very basic but extremely powerful tool that are mostly misunderstood and considered as a difficult or frustrating concept when programming. Pointers were created to help pass data around the code without having to create copies of the variables, thus not using extra memory.
Some languages avoid the concept, others partially embrace it but in Go we have pointers as they were meant to be: ̶a̶n̶ ̶i̶n̶s̶t̶r̶u̶m̶e̶n̶t̶ ̶o̶f̶ ̶t̶o̶r̶t̶u̶r̶̶e a great tool to optimize performance.
A pointer is a variable that references a certain location in memory where a value is stored, so you take a variable, place…
Programming with threads is always awesome, you can get results faster, work on more things at the same time and keep a server busy as much as possible, unfortunately this creates several problems that are not so obvious when you’re not used to working with threads.
In this short article I’ll guide you on what I consider the most common problems and how I usually work around them.
Across the tutorial we’ll be using the same base exercise which will run the numbers from 0–15 and print them on screen, after each step we’ll be incrementally adding new features but…
Python is a great language that can be picked up easily by a new developer and be productive in a short amount time, it is clean code by design and it has a million libraries available, sadly all of these benefits come at a price called “speed”, python is slow, very slow; pypy or stackless sometimes help with performance but at times they break other libraries that are not compatible or they don’t show any improvement on our specific use case.
You can always take the path of building a library in C and importing it, but to some C…
We start by downloading the VM from https://www.vulnhub.com/entry/sunset-midnight,517/, add it to VirtualBox and adjust the network settings.
We then fire up netdiscover to locate the VM’s IP address:
Following the instructions for the VM we add a hosts entry with that IP:
This week I’ll go over the steps to get root access on this VM.
As always we get it from vulnhub: https://www.vulnhub.com/entry/sunset-sundown,530/, this one was created by @whitecr0wz, whom is responsible for some very interesting VM’s.
First we’ll need to figure out where the machine is, so a netdiscover will find it after a couple of seconds:
netdiscover -i eth0 -r 192.168.0.0/24
Now that we have the target identified, we’ll proceed to enumerate the services running on it via nmap:
On this guide I’ll show you the steps to get the two flags (user.txt and proof.txt) hidden in this CTF.
We start by downloading the VM from https://www.vulnhub.com/entry/photographer-1,519/ load the .ova to VirtualBox and start it up.
We are greeted by the Ubuntu login screen and 2 users listed: agi and daisa, since I have this GUI access I can click on the up/down arrow icon and select connection information to view the machine’s IP address:
I’ll now use NMAP to find open ports:
In this guide I’ll go over the steps to get root access in this VM.
You can download the VM from: https://www.vulnhub.com/entry/cybersploit-2,511/
Once it’s running in VirtualBox, I run the usual netdiscover to get the IP address of the machine:
After that a quick NMAP will reveal that it has SSH and HTTP open:
In this walkthrough I am going to go over the steps I followed to get the flags on this CTF.
First off I got the VM from https://www.vulnhub.com/entry/funbox-1,518/ and loaded it to VirtualBox, loaded the .ova and had to change USB to 1.0 and set the network adapter to the ones on my server.
VM boots up and we just get the login screen with no additional information:
First I’ll start by booting up a Kali VM and then enumerating the devices on my network by using netdiscover: