#overthewire

hubertfhubertf
2025-06-04

I've never tried gdb remote-debugging, but seeing that there's a new pwndbg out, I felt like trying it out. Unfortunately on MacOS it's only for remote debugging, so let's do that!

terminal 1:
local% ssh -L 12345:localhost:12345 user@remote
remote$ gdbserver :12345 /whatever

terminal 2:
local% ./bin/pwndbg whatever-localcopy
(gdb) target remote localhost:12345

works - see screenshot πŸ™‚

pwndbg remote
Wen Bin :verified:kongwenbin@infosec.exchange
2025-06-01

πŸ“Œ Previously, I shared that I was working on creating a Step by Step Walkthrough series for OverTheWire Bandit?

The last (6th) video of the series just went live! πŸ”₯

Please check it out if you are interested yeah! 😊

youtube.com/playlist?list=PL2m

#hacking #HackingTutorials #overthewire #ethicalhacking #ctf #securityctf

hubertfhubertf
2025-02-24

Over The Wire vortex12: βœ…

Spoiler:
(gdb) ! ln -s /bin/sh %d

hubertfhubertf
2025-02-13

On thread vs. process permissions

In common Unix and POSIX systems, all threads in a process are supposed to have the same permission. So why does the vortex8 program work as exploited, where one thread sets different permissions than another one using setresuid/setresgid?

Reference: man7.org/linux/man-pages/man2/

Answer in thread.

hubertfhubertf
2025-02-08

Hausmeistern muss auch mal sein - heute etwas die bisherigen Notizen sortiert.

hubertfhubertf
2025-02-04
hubertfhubertf
2025-01-13

vortex7 βœ…
Spannendes Ende :)

hubertfhubertf
2024-11-18

Another Mad Monday

hubertfhubertf
2024-11-11

maze9@gibson:~$ cat CONGRATULATIONS
Well done!
It sure looks like you enjoy swimming in memory.

(Please don't post writeups, solutions or spoilers about the games on the web. Thank you!)

2024-10-01

So... the web is the future right? It's where most #bugBounty action is happening, it's where a lot of new apps find their feet. So how do we #hack it with a #screenReader? Where to learn about it and what tools to use? In today's IC_Null stream I want to focus on that question. The likes of #tryHackMe and #hackTheBox will be featured, but others like #portSwigger academy and #overTheWire will come up, too. Curious? Join me in an hour over at twitch.tv/ic_null or youtube.com/@blindlyCoding #infoSec #cybersecurity #selfPromo #twitch #youtube

Ricardo Alvesopqam
2024-09-30

Want to play some fun hacking games? πŸ•΅οΈβ€β™‚οΈ

Then this intermezzo is for you πŸ‘‰ dreaming-of-dragons.blogspot.c

I've recently finished the Bandit game in Over The Wire and decided to share a couple of tips and ideas I'd like to have known before starting the game myself.

No spoilers. Or your money back! ☺️

Ricardo Alvesopqam
2024-09-28

πŸ•΅οΈβ€β™‚οΈ I got hacked, and because of that you get my 6th blog post: "Wherein I Get Hacked And Learn In The Process: OTW" πŸ”

Ever had a friendly chat with a "hacker" in OverTheWire? I have.

πŸ‘‰ Join the adventure here: dreaming-of-dragons.blogspot.c

Ricardo Alvesopqam
2024-09-28

Adding finishing touches to my next blog post: on cracking simple passworded binaries. πŸ”πŸ’»
But while playing around with OverTheWire, I had a surprise guest hack into my tmux session, and we had a nice chat!

Tomorrow I'll be instead talking about that instead. πŸ•΅οΈβ€β™‚οΈ

Stay tuned!

hubertfhubertf
2024-09-10
hubertfhubertf
2024-08-01

bandit33@bandit:~$ cat README.txt
Congratulations on solving the last level of this game!

hubertfhubertf
2024-06-24

utumno8@gibson:~$ cat CONGRATULATIONS
Hell Yeah! You did it!

πŸ’ͺ

hubertfhubertf
2024-06-10

@overthewire hat das unfassbare gemacht: alle Challenge Passworte geaendert. Doof wenn man grad vor der letzten Challenge war und jetzt alles nochmal im Schnelldurchlauf durchspielen muss um weiterzumachen. Wohl dem der gut dokumentiert hat! :-)

2024-03-04

It's our monthly "Intro to Linux Command Line for Hackers" (and beginners) in @thegamerclub #Glasgow tonight from 6pm.

We'll work our way through the #bandit #wargame from #OverTheWire - all welcome to learn or help teach.

meetup.com/open-source-glasgow

#infosec #hacker #meetup #opensource #commandline #linux

Wen Bin :verified:kongwenbin@infosec.exchange
2024-01-12

πŸ‘‹ Following up on my previous post regarding posting a detailed video walkthrough series for #OverTheWire Bandit #CTF!!

πŸ’» Learning #cybersecurity can be fun!

πŸ‘‡ Here's the link to OverTheWire Bandit Level 13 to 18:

youtu.be/3K_68PLuk1s

Wen Bin :verified:kongwenbin@infosec.exchange
2023-10-15

πŸ‘‹ Following up on my previous post regarding posting a detailed video walkthrough series for #OverTheWire Bandit #CTF!!

πŸ’» Learning #cybersecurity can be fun!

πŸ‘‡ Here's the link to OverTheWire Bandit Level 7 to 12:

youtu.be/XVB-X0LaX6M

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst