PinnedRagnar SecurityinSystem WeaknessLimited Resources: Using Linux’s Ptrace to Achieve Your EndsHello — It’s WittsEnd2 again. As Linux continues to mature, advanced security features are added to both the userspace and kernel space…·9 min read·Jan 25, 2023----
PinnedRagnar SecurityReverse Engineering Bare Metal Kernel Images — Part 2·7 min read·May 23, 2021----
PinnedRagnar SecurityWhy You Should Learn Reverse Engineering and How to Get StartedI am WittsEnd2 — Founder of Ragnar Security. My mission is to give everyone to make complex cybersecurity topics easier to learn…5 min read·Jan 23, 2021----
Ragnar SecurityinSystem WeaknessRust vs. C: How are vulnerabilities different?Hello, I am WittsEnd2, founder of Ragnar Security. With new compiled languages like Rust and Golang coming, they have often drawn…·6 min read·Jan 18, 2022----
Ragnar SecurityinGeek CultureWriting Baremetal Firmware on Raspberry Pi for Cyber Security CTFS— SetupI am WittsEnd2, founder of Ragnar Security. Earlier in the year, I wrote a series about reverse engineering baremetal firmware. We analyzed…·6 min read·Dec 20, 2021----
Ragnar SecurityinCodeXUnderstanding The Linux Kernel Through CTF Challenges: SeccompI am WittsEnd2, founder of Ragnar Security. Today, we will be exploring Seccomp, a Linux kernel security feature. We will explore this…·6 min read·Aug 28, 2021----
Ragnar SecurityinGeek CultureReverse Engineering Bare-Metal Firmware — Part 3 | Analyzing ARM Assembly and ExploitingHello everyone, I am WittsEnd2: founder of Ragnar Security, and I will be continuing to teach you how to reverse engineer (and exploit)…·10 min read·Jun 20, 2021----
Ragnar SecurityinCodeXReverse Engineering Bare Metal Low-Level kernel images with QEMU: Getting StartedThis tutorial was designed as a setup tutorial for UMDCTF; however, it will be also be a part of a series for bare-metal embedded…·5 min read·Apr 12, 2021--1--1
Ragnar SecurityLearning To Take Apart A Phone — Reverse Engineering HardwareI am WittsEnd2 — Founder of Ragnar Security. My mission is to give everyone to make complex cybersecurity topics easier to learn…·4 min read·Jan 28, 2021----
Ragnar SecuritySecure C Coding through Binary Exploitation — Reading AssemblyIn the previous article, we discussed the origins of vulnerabilities and how having an offensive mindset can be a great tool for defense…3 min read·Jun 9, 2020----