Processing math: 100%

The Book of Gehn

I found 4 posts.


Cipherchat (Crypto writeup - EKO 2019)

Tags: challenge, eko, hacking, python, bytecode

October 1, 2019

We start with a communication between two machines, encrypted with an unknown algorithm and the challenge is to break it.

As a hint we have the code that the client used to talk with the server.


Weirdo (SQLi writeup - EKO 2019)

Tags: challenge, eko, sql, hacking

September 29, 2019

Quick writeup of a SQL injection challenge.


() { Magic Bash Runes

Tags: bash, shellshock, hacking

October 1, 2018

Despite of been 4 years old, Shellshock is still a very interesting topic to me not for the vulnerability itself but for the large ways to trigger it even in the most unexpected places.

Take the 4 characters () { and open the world.

Fragments found in the field.

Creativity and few hours reading man pages are all what you need.


Isolate a wifi card and keep your traffic out of the Big Brother sight

Tags: wifi, container, hacking

April 16, 2017

HTTP Proxies blacklisting evil domains, firewalls blocking weird traffic and IDSs looking for someone that shouldn’t be there are reasonable and understandable policies for a corporate environment.

But when a friend opened his browser this week and went to google.com the things got odd.

The browser refused the connection warning him that the SSL certificate of the server wasn’t issue by google.com at all or signed by a trusted authority.

- Martin Di Paola