July 9, 2023, 5:03 p.m. | StackZero

InfoSec Write-ups - Medium infosecwriteups.com

Unravelling PicoCTF: The GDB Baby Step 2 Challenge — StackZero

This article was originally published in its entirety at https://stackzero.net/gdb-baby-step-2/

Welcome back to our series on the GNU Debugger (GDB) and its applications in tackling the PicoCTF challenges. If you’re joining us for the first time, we recommend revisiting our guide on the GDB Baby Step 1 Challenge. This introductory piece provides a comprehensive overview of GDB, its functionalities, and its significance in the realm of Linux debugging. …

ctf ctf-writeup debugging picoctf reverse engineering

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Information Security Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Principal Security Researcher (Advanced Threat Prevention)

@ Palo Alto Networks | Santa Clara, CA, United States

EWT Infosec | IAM Technical Security Consultant - Manager

@ KPMG India | Bengaluru, Karnataka, India

Security Engineering Operations Manager

@ Gusto | San Francisco, CA; Denver, CO; Remote

Network Threat Detection Engineer

@ Meta | Denver, CO | Reston, VA | Menlo Park, CA | Washington, DC