Open in app

Sign In

Write

Sign In

Syscall59 — Alan Vivona
Syscall59 — Alan Vivona

593 Followers

Home

About

Published in Level Up Coding

·Aug 24, 2020

Build a Custom Linux for IoT

This tutorial will help you build a custom Linux distribution for your IoT/Embedded project using Buildroot (i.e: a Raspberry Pi). There are some other options out there but I find Buildroot to be consistent and easy enough so we’ll stick to it for the propose of this article. What is Buildroot? Buildroot is…

Programming

5 min read

Build a Custom Linux for IoT!
Build a Custom Linux for IoT!
Programming

5 min read


Published in DailyJS

·Aug 17, 2020

Writing a Game Boy Assembler/Disassembler in Node.js

The Game Boy uses a 8-bit computer chip similar to an Intel 8080. As it has only 256 instructions it’s an interesting candidate for experiments such as writing an assembler from scratch — and that’s what this article is about. Here I’ll describe the process I went through when I…

Nodejs

5 min read

Writing a Game Boy Assembler in Node.js
Writing a Game Boy Assembler in Node.js
Nodejs

5 min read


Published in InfoSec Write-ups

·Jan 17, 2020

Writing A Keygen Using Python Itertools

Today we are going to generate a simple keygen to crack this beautiful crackme named “Get The Password”. Here’s the beast:

Cybersecurity

3 min read

Writing A Keygen Using Python Itertools
Writing A Keygen Using Python Itertools
Cybersecurity

3 min read


Published in InfoSec Write-ups

·Dec 29, 2019

[Reverse Engineering] Beating a trial on a .net crackme

Today we are dealing with yet another .net crackme. Let’s see how it goes… The crackme is a sort of X-times usage trial. After we’ve opened the executable 10 times we have the opportunity to test if we cracked the trial or not. Using dotPeek we can decompile the binary…

Programming

2 min read

[Reverse Engineering] Beating a trial on a .net crackme
[Reverse Engineering] Beating a trial on a .net crackme
Programming

2 min read


Published in syscall59

·Dec 22, 2019

Reverse Engineering And Cracking A .Net Binary Using dnSpy

Learning how to crack a .net binary — Let’s see how to solve this .net crackme. Let’s try the crackme with some random credentials to see how it goes.

Programming

2 min read

Reverse Engineering And Cracking A .Net Binary Using dnSpy
Reverse Engineering And Cracking A .Net Binary Using dnSpy
Programming

2 min read


Published in syscall59

·Dec 16, 2019

[Reverse Engineering] Solving my first .net crackme

This time we are tackling this .net crackme. Let’s try it out first. It’s a simple form requesting a username and a serial key. On the main form code, we can see the validation method being called inside the confirmation button click method.

Cybersecurity

2 min read

[Reverse Engineering] Solving my first .net crackme
[Reverse Engineering] Solving my first .net crackme
Cybersecurity

2 min read


Published in syscall59

·Nov 8, 2019

[Reverse Engineering] 1 Mexican Crackme, 2 Automated Solutions

This time I’m tackling this crackme called Mexican. In order to solve this, we will use radare2’s to analyze the binary and find the flag. Then we’ll have to patch the binary in order for it to output the flag. Let’s jump right in! If we open the binary using…

Cybersecurity

3 min read

[Reverse Engineering] 1 Mexican Crackme, 2 Automated Solutions
[Reverse Engineering] 1 Mexican Crackme, 2 Automated Solutions
Cybersecurity

3 min read


Published in syscall59

·Oct 30, 2019

[Reverse Engineering] Cracking Alien Technology

We’ll be facing an alien binary this time. Level 2 alien technology, to be precise. Found on ruins of an ancient alien civilization. You can download the binary using this link and follow along: Alien Binary In the ruins of an ancient alien civilization, a micro sd card was found with this binary inside. It's asking us to feed…crackmes.one Let’s jump right into it! Taking a quick look at the code-flow in the main function…

Cybersecurity

2 min read

[Reverse Engineering] Cracking Alien technology
[Reverse Engineering] Cracking Alien technology
Cybersecurity

2 min read


Published in syscall59

·Jul 17, 2019

[Reverse Engineering] Using Macros & Emulation Voodoo

This time I’m tackling this beautiful crackme, the third of the series. To solve this we will use radare2’s macros and unicorn emulation. Let’s jump right in! Some Introductory Analysis The crackme asks for a 4 digit password that the user needs to input one digit at the time. Similar to a PIN. …

Hacking

4 min read

[Reverse Engineering] Using Macros & Emulation Voodoo
[Reverse Engineering] Using Macros & Emulation Voodoo
Hacking

4 min read


Published in syscall59

·Jul 16, 2019

[Reverse Engineering] Crackme2-be-D4RK_FL0W Walkthrough

This is a walkthrough for the second crackme of this series. Here’s the main function. Here we can see there’s a function call to the “xxx” function right after the input is received. Here’s the meat of the crackme. Inside the “xxx” function the password is generated:

Hacking

2 min read

[Reverse Engineering] Crackme2-be-D4RK_FL0W Walkthrough
[Reverse Engineering] Crackme2-be-D4RK_FL0W Walkthrough
Hacking

2 min read

Syscall59 — Alan Vivona

Syscall59 — Alan Vivona

593 Followers

Golang, Python, Javascript, Linux & Infosec. https://twitter.com/syscall59

Following
  • @cowtowncoder

    @cowtowncoder

  • Mario

    Mario

  • Lokesh Kumar

    Lokesh Kumar

  • Liz Rice

    Liz Rice

  • Georgia Weidman

    Georgia Weidman

See all (43)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech