Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack Five (Custom Shellcode)This blog post is a bit different. Instead of a new challenge, it is an extension of the previous Phoenix Stack Five writeup. Those…May 20, 2023May 20, 2023
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack Five (Pwntools Shellcode)Phoenix Challenges — Stack Five (Pwntools Shellcode)May 15, 2023May 15, 2023
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack FourThe ChallengeFeb 5, 2023Feb 5, 2023
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack ThreeThe ChallengeDec 5, 2022Dec 5, 2022
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack TwoThe ChallengeOct 30, 2022Oct 30, 2022
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack ZeroAn explanation of Exploit Education’s Phoenix “Stack Zero” hacking challenge and the involved solutionsAug 7, 2022Aug 7, 2022
Nathan PavlovskyPhoenix Challenges — Getting Set UpThis is the first of a series of writeups for the Phoenix challenges and explains how those wanting to follow along can get set up.May 16, 2022May 16, 2022
Nathan PavlovskyLearning to Code For InfosecA commonly-repeated mantra for current and future practitioners at InfoSec conference talks, blog posts, and Twitter threads is that one…May 15, 2022May 15, 2022
Nathan PavlovskyWhy Programmers Should Learn Embedded SystemsAn explanation of why every computer science student and software engineer would benefit from learning embedded systems.Jan 23, 2021Jan 23, 2021