Quantcast
Channel: Lopi Security
Browsing all 21 articles
Browse latest View live

iX SHR 1.00 Release

Hey folks,It has been awhile since I have made a blog post. iX went through some serious changes. I recently switched domains and hosts. The good news is this is a release post. I'll start by listing...

View Article



The Future of iX

Hey all,It has been a few weeks. Recently, I have been trying to decide the future of the iX project. I'm still undecided at this point, but here's what I have been pondering:Build a custom linux...

View Article

The Capabilities of OpeniBoot

Greetings all,I'd like to start by apologizing for the lack of updates on the blog. I'm going to make a better effort to update the blog on a weekly basis. Procrastination usually gets the best of me...

View Article

Latest advancements with iX

Hey all,It's me again. I wanted to detail all the latest advancements I have made in the past few months with iX. I want this to be a very visual post. You'll be seeing lots of screenshots that mostly...

View Article

iX SHR 1.10 Release

Hey everyone,I promised a release was coming soon and it's finally here! It has been several months since my last release, but I promise I have been working hard. I hope everyone enjoys this release...

View Article


My Jedi Master: lilstevie

Hey all,It has been a few weeks. This post is all about my jedi master, lilstevie. He's one of the founding members of Project iX and has contributed to the project from the start. We can't thank him...

View Article

SmashTheStack IO - Level 1

I've been going through the smashthestack war games recently. This is the first level of the IO war game.Using username "level1". ____ ____||i |||o || Welcome at IO and...

View Article

SmashTheStack IO - Level 2

The second level of IO was a little more difficult, but Wikipedia makes it really easy.login as: level2 ____ ____||i |||o || Welcome at IO and smashthestack!||__|||__|||/__\|/__\| If you have problems...

View Article


SmashTheStack IO - Level 3

Level three teaches very basic concepts regarding buffer overflows. This is far from what you need to know to write an exploit, but it will give you a basic understanding of how a buffer overflow...

View Article


SmashTheStack IO - Level 4

Level four was a really easy level and doesn't take much explanation. Learn how any *nix based operating system executes commands and you'll win like no problem. As always, here's my log with...

View Article

Learning Scapy - SYN Stealth Port Scanner aka SynCity

For a long time I never understood what a SYN Stealth actually did. With nmap, this is the -sS option. To get a better understanding of how a SYN Stealth scan works I wrote one in python using...

View Article

SmashTheStack IO - Level 5: Writing my first buffer overflow

This level was a little more complicated than the previous levels. As always, we need to get the password from /home/level6/.pass. In this level we learn a little about reverse engineering and how to...

View Article

SmashTheStack IO - Level 6

This post's primary purpose will be for my own documentation. Refer to my post on level five if you get confused; the exact same exploitation technique is used in this level. This log is slightly more...

View Article


SmashTheStack IO - Level 7: Integer Underflow

This level was actually pretty tricky. It took me awhile to understand what I needed to do. Keep in mind this is not my full log. I tried much more than what is posted here.login as: level7 ____...

View Article

How a random question changed my default search engine to DuckDuckGo

Last semester I created a registered student organization for those interested in penetration testing and security at my university. The club I created is focused on self motivated students interested...

View Article


Image may be NSFW.
Clik here to view.

How I won the NCL 2012 Championship

National Cyber League 2012Before the NCL 2012 championships, I was ranked 6th nationally and 3rd in the midwest conference. I ended up winning the NCL championships with 12,00 points or 9/25 flags....

View Article

Traversing User Timelines with the Twitter API

IntroductionI recently took up a python project for two professors at my university. They've undertaken a research project looking at football players' use of Twitter. The professors gave me the...

View Article


BSidesChicago CTF: Hashes

BSides Chicago CTF Hashes ChallengeThis is a write up for the "Hashes" challenge which was rated as moderate difficult. We were given the following LM hashes in a text...

View Article

Image may be NSFW.
Clik here to view.

BSidesChicago CTF: Keep it Secret, Keep it Safe

Forensics Challenge: Keep it Secret, Keep it SafeThis is a write up for the "Keep it Secret, Keep it Safe" forensics challenge rated as moderate difficulty. We're presented with the following...

View Article

Image may be NSFW.
Clik here to view.

BSides Chicago CTF: Not The Secret Portal

 Web Challenge: Not The Secret PortalThis is a write up of the "Not The Secret Portal" web challenge rated as easy difficulty. We're presented with the following description:I really enjoy working for...

View Article
Browsing all 21 articles
Browse latest View live




Latest Images