PinnedRagnar SecurityinSystem WeaknessLimited Resources: Using Linux’s Ptrace to Achieve Your EndsHello — It’s WittsEnd2 again. As Linux continues to mature, advanced security features are added to both the userspace and kernel space…Jan 25, 2023Jan 25, 2023
PinnedRagnar SecurityWhy You Should Learn Reverse Engineering and How to Get StartedI am WittsEnd2 — Founder of Ragnar Security. My mission is to give everyone to make complex cybersecurity topics easier to learn…Jan 23, 2021Jan 23, 2021
Ragnar SecurityinSystem WeaknessRust vs. C: How are vulnerabilities different?Hello, I am WittsEnd2, founder of Ragnar Security. With new compiled languages like Rust and Golang coming, they have often drawn…Jan 18, 2022Jan 18, 2022
Ragnar SecurityinGeek CultureWriting Baremetal Firmware on Raspberry Pi for Cyber Security CTFS— SetupI am WittsEnd2, founder of Ragnar Security. Earlier in the year, I wrote a series about reverse engineering baremetal firmware. We analyzed…Dec 20, 2021Dec 20, 2021
Ragnar SecurityinCodeXUnderstanding The Linux Kernel Through CTF Challenges: SeccompI am WittsEnd2, founder of Ragnar Security. Today, we will be exploring Seccomp, a Linux kernel security feature. We will explore this…Aug 28, 2021Aug 28, 2021
Ragnar SecurityinGeek CultureReverse Engineering Bare-Metal Firmware — Part 3 | Analyzing ARM Assembly and ExploitingHello everyone, I am WittsEnd2: founder of Ragnar Security, and I will be continuing to teach you how to reverse engineer (and exploit)…Jun 20, 2021Jun 20, 2021
Ragnar SecurityinCodeXReverse Engineering Bare Metal Low-Level kernel images with QEMU: Getting StartedThis tutorial was designed as a setup tutorial for UMDCTF; however, it will be also be a part of a series for bare-metal embedded…Apr 12, 20211Apr 12, 20211
Ragnar SecurityLearning To Take Apart A Phone — Reverse Engineering HardwareI am WittsEnd2 — Founder of Ragnar Security. My mission is to give everyone to make complex cybersecurity topics easier to learn…Jan 28, 2021Jan 28, 2021
Ragnar SecuritySecure C Coding through Binary Exploitation — Reading AssemblyIn the previous article, we discussed the origins of vulnerabilities and how having an offensive mindset can be a great tool for defense…Jun 9, 2020Jun 9, 2020