Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack Five (Custom Shellcode)This blog post is a bit different. Instead of a new challenge, it is an extension of the previous Phoenix Stack Five writeup. Those…6 min read·May 20, 2023----
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack Five (Pwntools Shellcode)Phoenix Challenges — Stack Five (Pwntools Shellcode)7 min read·May 15, 2023----
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack FourThe Challenge10 min read·Feb 5, 2023----
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack ThreeThe Challenge8 min read·Dec 5, 2022----
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack TwoThe Challenge6 min read·Oct 30, 2022----
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack OneThe Challenge5 min read·Sep 3, 2022----
Nathan PavlovskyinInfoSec Write-upsPhoenix Challenges — Stack ZeroAn explanation of Exploit Education’s Phoenix “Stack Zero” hacking challenge and the involved solutions4 min read·Aug 7, 2022----
Nathan PavlovskyPhoenix Challenges — Getting Set UpThis is the first of a series of writeups for the Phoenix challenges and explains how those wanting to follow along can get set up.3 min read·May 16, 2022----
Nathan PavlovskyLearning to Code For InfosecA commonly-repeated mantra for current and future practitioners at InfoSec conference talks, blog posts, and Twitter threads is that one…4 min read·May 15, 2022----
Nathan PavlovskyWhy Programmers Should Learn Embedded SystemsAn explanation of why every computer science student and software engineer would benefit from learning embedded systems.2 min read·Jan 23, 2021----