0x7ff3a2b8c000
mov rdi, rsp
call _start
jmp 0xdeadbeef
xor eax, eax
push rbp
syscall
ret
nop
int 0x80
mov rdi, rsp
call _start
jmp 0xdeadbeef
xor eax, eax
push rbp
syscall
ret
nop
int 0x80
root@pattie ~
notes from the terminal
A sysadmin and cybersecurity learning log. Documenting labs, CTFs, HackerBox builds, and the occasional late-night rabbit hole.
about this site
notes + writeups from a sysadmin learning offensive security
expect: lab builds, ctf writeups, hardening guides, and the occasional rabbit hole. no fluff.
session.sh
0xDEADBEEFsudo systemctl restart sshd192.168.1.50:22chmod 27700x7FF3A2B8C000nmap -sV -sC target10.10.14.12:4444uid=0(root)0xCAFEBABEdocker compose up -d172.16.0.1:8080-rwxrws---0xDEADBEEFsudo systemctl restart sshd192.168.1.50:22chmod 27700x7FF3A2B8C000nmap -sV -sC target10.10.14.12:4444uid=0(root)
// browse by category
sysadmin 1 post cybersecurity 5 posts
tryhackme coming soon
hackerbox coming soon
devops 1 post thoughts coming soon
// latest transmissions
Docker for Beginners. you just got told to containerize everything.
You're a junior sysadmin, your manager just dropped "migrate everything to containers by end of sprint" in Slack, and you Google'd what is a container. Welcome. Let's actually fix that.
read more →Build Your Own Pentesting Lab. part 4: your first hack.
The lab is built. The targets are running. Time to actually break into something. Then we'll talk about where to go from here.
read more →Build Your Own Pentesting Lab. part 3: the machines you're allowed to break.
An attack machine with nothing to attack is just a really cool Linux desktop. Time to give it something to do. We're deploying vulnerable targets and locking the whole thing inside an isolated network.
read more → /dev/random
// follow the work
no spam, no algorithm. just labs and writeups.