<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://jurf3d.github.io/</id><title>Jurf3d</title><subtitle></subtitle> <updated>2024-09-10T17:25:15+00:00</updated> <author> <name>Jurf3d</name> <uri>https://jurf3d.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://jurf3d.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://jurf3d.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.3.3">Jekyll</generator> <rights> © 2024 Jurf3d </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>Cryptography Guide For UTAR Students</title><link href="https://jurf3d.github.io/posts/crypto/" rel="alternate" type="text/html" title="Cryptography Guide For UTAR Students" /><published>2024-08-04T16:00:00+00:00</published> <updated>2024-09-10T17:24:53+00:00</updated> <id>https://jurf3d.github.io/posts/crypto/</id> <content src="https://jurf3d.github.io/posts/crypto/" /> <author> <name>Jurf3d</name> </author> <category term="Cryptography" /> <summary>Cryptography Overview Nowadays, cryptography challenges in CTF competitions have become more difficult and more common. Unlike Web and binary challenges, cryptography tests participants’ foundational knowledge and requires strong mathematical skills, logical thinking and analytical abilities. Cryptography challenges are varied such as: Statistical Analysis: Participants are given...</summary> </entry> <entry><title>Binary Exploitation (PWN) Guide For UTAR Students</title><link href="https://jurf3d.github.io/posts/pwn/" rel="alternate" type="text/html" title="Binary Exploitation (PWN) Guide For UTAR Students" /><published>2024-07-22T16:00:00+00:00</published> <updated>2024-09-10T16:51:51+00:00</updated> <id>https://jurf3d.github.io/posts/pwn/</id> <content src="https://jurf3d.github.io/posts/pwn/" /> <author> <name>Jurf3d</name> </author> <category term="Binary Exploitation" /> <summary>PWN Basics Do note that this guide is intended for purely beginners in CTF. Hence, the contents will be simplified as to not chase beginners away from this category. Before starting with PWN, please learn some basic reverse engineering skills first as you will need it. PWN in hacker slang means break in and gain access, which comes from the word own, like you “own” the system. In CTF PWN chal...</summary> </entry> <entry><title>Forensic/Steganography Guide For UTAR Students</title><link href="https://jurf3d.github.io/posts/forensics/" rel="alternate" type="text/html" title="Forensic/Steganography Guide For UTAR Students" /><published>2024-07-16T16:00:00+00:00</published> <updated>2024-09-10T16:51:51+00:00</updated> <id>https://jurf3d.github.io/posts/forensics/</id> <content src="https://jurf3d.github.io/posts/forensics/" /> <author> <name>Jurf3d</name> </author> <category term="Forensic/Steganography" /> <summary>Forensics and Steganography Overview Do note that this guide is intended for purely beginners in CTF. Hence, the contents will be simplified as to not chase beginners away from this category. In digital forensics, experts investigate computers, phones, or other devices to find out what happened to the data. Maybe someone deleted important files, or maybe there is something hidden in the device...</summary> </entry> <entry><title>OSINT Guide For UTAR Students</title><link href="https://jurf3d.github.io/posts/OSINT/" rel="alternate" type="text/html" title="OSINT Guide For UTAR Students" /><published>2024-07-14T16:00:00+00:00</published> <updated>2024-09-10T16:51:51+00:00</updated> <id>https://jurf3d.github.io/posts/OSINT/</id> <content src="https://jurf3d.github.io/posts/OSINT/" /> <author> <name>Jurf3d</name> </author> <category term="OSINT" /> <summary>OSINT Overview Open-Source Intelligence (OSINT) refers to the practice of gathering information from publicly available sources. It involves using various tools and methods to collect, process, and analyze data to extract useful insights. OSINT techniques are commonly used in cybersecurity for tasks like threat analysis and verifying the authenticity of online content, such as photos and videos...</summary> </entry> <entry><title>Reverse Engineer Guide For UTAR Students</title><link href="https://jurf3d.github.io/posts/reverse-engineer/" rel="alternate" type="text/html" title="Reverse Engineer Guide For UTAR Students" /><published>2024-06-29T16:00:00+00:00</published> <updated>2024-09-10T16:51:51+00:00</updated> <id>https://jurf3d.github.io/posts/reverse-engineer/</id> <content src="https://jurf3d.github.io/posts/reverse-engineer/" /> <author> <name>Jurf3d</name> </author> <category term="Reverse Engineer" /> <summary>Reverse Engineering Basics and Pre-Requisites Before we learn how to reverse engineering, we need to have a few basic pre-requisites: Basic understanding of C programming language Knowing how to code in python Common sense Reverse engineering is usually the process of taking a program that has been compiled and rewriting it in a way that is easier for humans to understand. In CTF, ...</summary> </entry> </feed>
