PinnedPublished inSystem WeaknessLimited Resources: Using Linux’s Ptrace to Achieve Your EndsHello — It’s WittsEnd2 again. As Linux continues to mature, advanced security features are added to both the userspace and kernel space…Jan 25, 2023Jan 25, 2023
PinnedWhy You Should Learn Reverse Engineering and How to Get StartedI am WittsEnd2 — Founder of Ragnar Security. My mission is to give everyone to make complex cybersecurity topics easier to learn…Jan 23, 2021Jan 23, 2021
Published inSystem WeaknessRust vs. C: How are vulnerabilities different?Hello, I am WittsEnd2, founder of Ragnar Security. With new compiled languages like Rust and Golang coming, they have often drawn…Jan 18, 2022Jan 18, 2022
Published inGeek CultureWriting Baremetal Firmware on Raspberry Pi for Cyber Security CTFS— SetupI am WittsEnd2, founder of Ragnar Security. Earlier in the year, I wrote a series about reverse engineering baremetal firmware. We analyzed…Dec 20, 2021Dec 20, 2021
Published inCodeXUnderstanding The Linux Kernel Through CTF Challenges: SeccompI am WittsEnd2, founder of Ragnar Security. Today, we will be exploring Seccomp, a Linux kernel security feature. We will explore this…Aug 28, 2021Aug 28, 2021
Published inGeek CultureReverse Engineering Bare-Metal Firmware — Part 3 | Analyzing ARM Assembly and ExploitingHello everyone, I am WittsEnd2: founder of Ragnar Security, and I will be continuing to teach you how to reverse engineer (and exploit)…Jun 20, 2021Jun 20, 2021
Published inCodeXReverse Engineering Bare Metal Low-Level kernel images with QEMU: Getting StartedThis tutorial was designed as a setup tutorial for UMDCTF; however, it will be also be a part of a series for bare-metal embedded…Apr 12, 20211Apr 12, 20211
Learning To Take Apart A Phone — Reverse Engineering HardwareI am WittsEnd2 — Founder of Ragnar Security. My mission is to give everyone to make complex cybersecurity topics easier to learn…Jan 28, 2021Jan 28, 2021
Secure C Coding through Binary Exploitation — Reading AssemblyIn the previous article, we discussed the origins of vulnerabilities and how having an offensive mindset can be a great tool for defense…Jun 9, 20201Jun 9, 20201