March 13, 2023, 1:16 p.m. | f3ru0s Kormy

System Weakness - Medium systemweakness.com

Binary Exploitation Category;

~ In this article, we will cover:

  1. Introduction
  2. Stonks Writeup

1. Introduction

2. Stonks Writeup.

Description

I decided to try something noone else has before. I made a bot to automatically trade stonks for me using AI and machine learning. I wouldn’t believe you if you told me it’s unsecure!

nc mercury.picoctf.net 59616

Solution

After opening the file, both in nc and looking at the code vuln.c,
The inputs of the API token were being taken and …

ai and machine learning api article binary binary exploitation bot code ctf-writeup exploitation file hacking inputs machine machine learning malloc memory memory allocation mercury .net picoctf taken token trade vuln writeup

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Engineer, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

BaaN IV Techno-functional consultant-On-Balfour

@ Marlabs | Piscataway, US

Senior Security Analyst

@ BETSOL | Bengaluru, India

Security Operations Centre Operator

@ NEXTDC | West Footscray, Australia

Senior Network and Security Research Officer

@ University of Toronto | Toronto, ON, CA