A Look at AFL++ Under The Hood
A Look at AFL++ Under The Hood How this post is structured The objective of this post is to allow anyone to gain an understanding of AFL at the level they want. I want to cover AFL at both a usage level and an internals level. At the end of this article, there are In-Depth sections that cover AFL in even more depth. One additional note. In the code snippets, I often use ....
Reversing Macos Malware (Tinyshell)
In my little journey of learning about macOS/Apple security, I will be documenting things I have learned via blogpost. This might not be useful to most researches since they probably know more about this topic but this should be a good resource for other beginners in this field. For the first post, I will document my step in reversing a simple yet interesting malware, TinyShell. It’s important to not, I used Mitten Mac’s post as a reference....
Creating an IPTables Backdoor
Introduction For my project, I chose the ambitious goal of adding a backdoor to Linux’s iptables firewall. In order to do this, I had to delve deep into the Linux kernel and study the inner workings of the networking stack. Through my efforts, I was able to make iptables accept specially-crafted packets, even if the user-defined rules say otherwise. The Evil Bit In April 2003, the Internet Engineering Task Force published RFC3514, which defines a previously-unused bit of the IPv4 fragment offset field as the “evil bit” or security flag....
Welcome to the RITSEC Blog!
This is a place for RITSEC members to post about what they’re currently researching, cool projects, or anything RITSEC related. These posts contribute to the greater security community, so get your voice out there! We also have a tiered rewards program to incentivize our members to share what they’re woking on! For members, 1 blog post is equivalent to one research presentation, and making blog posts will earn you prizes!