Kevin MasseyQemu Escape CTF WriteupThis writeup will demonstrate my analysis and solution of the X-NUCA 2019 qemu escape CTF challenge. For those interested in following…Jun 23, 2023Jun 23, 2023
Kevin MasseyCVE-2021–33913 AnalysisCVE-2021–33913 is a heap-based buffer overflow that takes place in the SPF macro expansion process of the open source SPF library libspf2…Dec 3, 2022Dec 3, 2022
Kevin MasseyReverse Engineering Binary Protocols to Create IPS SignaturesThe purpose of this article is to demonstrate some tools and techniques used in reverse engineering binary protocols from packet captures…Oct 19, 2022Oct 19, 2022
Kevin MasseyEverything In Its Right Place: Pt 3In the previous article in this series we added bins, or free lists, to our implementation and demonstrated how we could leverage a…Aug 27, 2022Aug 27, 2022
Kevin MasseyEverything In It’s Right PlaceExploring Memory allocation, vulnerabilities, and exploitationJul 25, 20222Jul 25, 20222
Kevin MasseyWriting a Wireshark dissector to parse data embedded in ICMP headersI recently spent some time repurposing fields in ICMP headers in order to do a basic file transfer. I decided to use the code, ID, and…Apr 21, 2022Apr 21, 2022
Kevin MasseyCVE-2018–1160 WriteupCVE-2018–1160 is an out of bounds write in Netatalk versions prior to 3.1.12 which was disclosed by Jacob Baines of Tenable who also did a…Nov 24, 2021Nov 24, 2021