Blog
Thoughts, notes, and technical writings.
Computer Architecture Notes
This note is taken while reading book: Computer Architecture: A Quantitative Approach, 6th Edition. Chapter 1: Fundamentals of Quantitative Design and Analysis Concepts ISA Class: GPR, Stack, … Read more →
ROP from Zero to Hero — x64
Intro In the previous article, we covered parameter passing conventions for both x86 and x64 architectures, and performed a basic ROP attack on an x86 binary. This time, let’s take the plunge … Read more →
ROP from Zero to Hero — x86
Preface My advisor recently assigned me a task involving the reproduction of SGX-related attacks, which use ROP (Return-Oriented Programming). Since I had zero prior experience with binary … Read more →
Photography Notes
Why Write This To remind myself and share what I’ve learned. Why Photography Technically speaking: to preserve a visual record of a specific moment in time for future reference. Artistically … Read more →
Budget Security Hardware (Part 2) — RFID Hacking with PN532
Introduction Hardware security can feel inaccessible to beginners—partly because specialized security research equipment tends to be expensive. In this series, I want to show readers how to experience … Read more →
Budget Security Hardware (Part 1) — BadUSB with Arduino
Introduction Hardware security can feel inaccessible to beginners—partly because specialized security research equipment tends to be expensive. In this series, I want to show readers how to experience … Read more →
Cracking 802.1x Enterprise Wi-Fi with Kali NetHunter
Background My university’s wireless network uses 802.1x (WPA-Enterprise) authentication—you can probably see where this is going. I previously deployed hostapd-wpe on a Kali 2.0 desktop, but … Read more →
First Impressions of Kali NetHunter on the OnePlus 3
Introduction Ever since Kali NetHunter was released, I’ve been following the project closely. However, the list of compatible devices was always quite limited. When the OnePlus 3 (OP3) launched … Read more →