Techryptic's Blog

Technology Enthusiast, CTF Player, Vulnerability Research, Reverse Engineering, Pen-Testing, and other.

Annoying Apple Fans: The Flipper Zero Bluetooth Prank Revealed

9/6/2023 Update: I’d like to draw your attention to the fact that I’ve been addressing this matter since November 2022. Feel free to examine my Twitter or YouTube history for further information...

Tile's Anti-Theft Mode: Separating Hype from Reality

Tile’s Anti-Theft Mode: Separating Hype from Reality Tile is a technology company specializing in Bluetooth Low Energy (BLE or Bluetooth LE) enabled trackers. With the help of these trackers, user...

Pokémon Shellcode Loader

Pokémon Shellcode Loader Note #1 Updated Code will be on my GitHub: https://github.com/Techryptic/Pokemon-Shellcode-Loader Note #2 GitBooks: https://techryptic.gitbook.io/pokemon-shellcode...

Leading a Red Team through and through..

Leading a Red Team through and through Over the years of leading red teams for both the public and private sectors, I started developing a knack. I feel comfortable enough to start writing about s...

Bluetooth Low Energy Asset and Personnel Tracking, BLE-APT.

Bluetooth Low Energy Asset and Personnel Tracking, BLE-APT Visit my Github for the most updated code: https://github.com/Techryptic/BLE-APT BLE-APT develops a ‘digital fingerprint’ to identify BLE...

Windows Compress Utility SEH-Based Stack Overflow Exploit

Windows Compress Utility SEH-Based Stack Overflow Exploit Some Context: I was working on an assessment and found open read/write shares on a machine. There was batch file that would auto-run eve...

XML External Entity (XXE) Injection Without Personal Servers

XML External Entity (XXE) Injection Without Personal Servers Most post I read online regarding XXEs introduce the idea of spinning up a quick webserver to deliver and recieve content. While test...

Study Guide & Tips: Offensive Security Certified Expert (OSCE) / Cracking The Perimeter (CTP)

Study Guide & Tips: Offensive Security Certified Expert (OSCE) / Cracking The Perimeter (CTP) Glad you made it here, I was in your spot one time looking for additional resources to prime ...

Road to Parallel Execution of Selenium Webdriver Using Multithreading

Road to Parallel Execution of Selenium Webdriver Using Multithreading : Some highlights of selenium: Automates browsers Can be run in headless mode if needed Since PhantomJS is outdated, Sel...

HackTheBox (HTB) thoughts as Guru Rank

HackTheBox (HTB) thoughts as Guru Rank : Here are my random thoughts on HackTheBox, which will be known as HTB for the rest of the post. Background: I completed the Offensive Security Certified...

Red Team Nightmare (AV Bypass)

Red Team Nightmare (AV Bypass) : You made your way into an interactive box, where you need to use some privilege escalation techniques to gain system. This isn’t a post about the various techniq...

Using PTRACE to Inspect & Alter Memory

Using PTRACE to Inspect & Alter Memory. This is a fun project I worked on to use the ptrace functionality to inspect and alter memory (PEEKDATA/POKEDATA). Some general statements: I’ll be ...

IoT Pentest: Firmware Analysis on Network Camera

The IoT device that we’ll be reversing is the Axis M1034-W Network Camera. Without actually having the camera infront of me to tinker with, we’ll skip a few steps and move on to reversing the firm...

Linear Sweep x86 Disassembler

My Disassembler attempts to parse arbitrary binary input into x86 assembly code. Uses Linear Sweep algorithm to disassemble an arbitrary binary file: Only the following mnemonics are implement...

OSCP & PWK Review

This course exceeded my expectations. This we’ll be a very quick review for those looking to expand into pen-testing while going for the bad-ass of certifications. I am now studying for my SLAE...

Cyber Defense Competition: Writeup as Blue Team Leader

Hello all, here is my story of an amazing event that took place this past weekend. Preparation My team and I started as 6 members, in the end two members “left” and it was only four of us. We prac...

National Security Agency (NSA) Code Breaker 2016 Challenge Writeup

This was my first year I participated in the NSA Codebreaker Challenge, and I’m glad I took the ride. This year focused on reverse engineering and some modern vulnerability exploitations. They incl...

OCR-Engine-Playground

From my last Keybr.com project, I ran into a new website nitrotype.com which has different security mechanisms. Aside from using any Chrome Developer tools, I wanted to test out if I can build a sy...

Keybr - Multiplayer Cheater

I recently found out about the website Keybr.com, which is used to improve your typing speed. I’m averaging around 105 wpm, but there is room for improvements. Keybr introduces a fun way to improve...

Using RTL-SDR to Open Car Doors

Must note that using a jammer within USA is illegal. This post been changed to exclude any infomation on how to **successfully carry out the attack, it will show the bases used but will not go in-...