This writeup explains my thought process as I solve two smart contract hacking challenges—Dragon Slayer and Diamond Heist—from this year's HackTM Quals CTF.
I think that self-taught programmers can be just as qualified for the job as those who had a guided computer science (CS) education.
I am very confident that I made the right decision to stop pursuing my degree. The purpose of this blog post is to document most of my thoughts about university life, my decision, and life in general.
I have never posted rev/pwn writeups here, so I figured I should do some from Defcon CTF Quals this year.
Some codebases are stunningly large. Because there's no way to ever read over every line of code, I use complex search queries to look for interesting, potentially vulnerable code.
I made a big mistake in high school and felt like writing about it.
This post is an informal writeup about multiple vulnerabilities in uftpd FTP server, some of which could lead to remote code execution.
This is a short writeup about a critical severity vulnerability that led me to discover another high severity vulnerability in a Navy website covered by the Department of Defense's HackerOne program.
This post is about a little-known type of vulnerability in which the attacker manipulates the parameters bound to prepared statements with malicious goals such as bypassing access control.
This blog post documents the construction and operation of a silent 6 GPU Ethereum miner I built for fun.
This is a technical writeup about a vulnerability in Mythic Beasts that led to total account compromise, and why being able to chain XSS with CSRF is so dangerous.
This was written to help some friends of mine who are becoming interested in cybersecurity to be able to learn. It explains web vulnerabilities including XSS, CSRF, SQLi, IAC, and window.opener.