Posts
Ap3x | Noah Tongate
Cancel

Exploit Exercise Protostar Stack Series

Exploit Exercises Protostar Stack Series In this series I will solve each of the seven levels of in from exploit exercises protostar. You can find more info about the challenges here. I will show ...

Pivoting with Chisel

Summary Recently I’ve completed the Hack The Box Dante Pro Labs and really enjoyed it. One of the most crucial pieces to being successful in the lab is understanding how to pivot properly. So I wan...

HTB Dante Pro Lab and THM Throwback AD Lab

Summary Over the course of a couple months I’ve been really busy with school and trying to finish my undergraduate degree in Computer Science and Engineering, but I managed to squeeze in some time ...

HackIN CTF

Intro Recently, I competed in a CTF hosted by Booz Allen Hamilton and sponsored by NAVSEA and IN3 to name a few. I found out about the CTF through a social media post and a flyer that was sent thro...

Proxmox VM Creation Script for Quick Pentest Lab

Summary While studying for my OSCP I used various platforms to help me prepare for the exam such as Hack the Box and Pentester Labs. The only issue is that they all costed money for the features I ...

Infection Monkey - Securing My Network

DEFCON Safe Mode 2020 - Infection Monkey During this week of DEFCON Safe Mode I listened to a lot of fantastic talks from new techniques about Domain Hiding (Domain Fronting), Red Team CCDC techniq...

EggHunter x86_64

What is an Egg Hunter? Essentially an egg hunter is used assuming that you found a overflow vulnerability with a very small space that you, the attacker controls that is less that that of a bind/r...

Backdooring Portable Executables (PE)

Summary In this section of my I will be covering the topic of backdooring executables using shellcode and code caves. Code Caves Intro Many people may have never heard about code caves unless you...

Advance Web Attacks

Introduction This content is gathered from multiple different resources that I have added all to this post that helped me understand and learn more about exploit development. There are a lot of go...

Offensive Security Certified Expert Study Plan

While taking summer computer science and engineering classes I took part in an independent study which allows me to make my own course essentially and do research on the topics I choose. So I decid...