Malware Analysis and Reverse Engineering Enthusiast.
New blog post!
๐งฎ Ints Arenโt Integers and Floats Arenโt Real
Some musings on x86 flags, the CMP instruction, floating point quirks, and why 0.1 + 0.2 might actually break a bridge ๐
Also: CTF fun, more TPM stuffssess, and a reminder that breaking stuff on purpose is still the best way to learn ๐งจ
Read here: https://dreaming-of-dragons.blogspot.com/2025/07/ints-arent-integers-and-floats-arent.html
#assembly #ctf #floatingpoint #reversing #linux #cybersecurity #infosec
New blog post up ๐ต๏ธโโ๏ธ
๐ง Playing With Bits: Of Malware Labs, Steganography and Narnia
A peek into hiding data in images, setting up a simple but safe malware lab, and revisiting the OverTheWire Narnia wargame ๐งโโ๏ธ
Read here: https://dreaming-of-dragons.blogspot.com/2025/06/playing-with-bits-of-malware-labs.html
#malwareanalysis #steganography #ctf #reversing #cybersecurity #linux #hacking
Hey. Because it's really really simple. The header has only 3 or 4 entries and it has no compression nor any encryption.
It's possible to do on other mediums, of course, but it's extra work, and I only wanted to manipulate bits in a meaningful way. :)
๐ ๏ธ Built a couple of small Python tools:
One writes hidden messages into .ppm images using basic steganography.
The other extracts those messages back out.
Itโs just a proof of conceptโbut feel free to explore or reuse if you're curious.
More details coming in my next blog post.
Just wanted to give a quick heads-up.
Happy poking. ๐๐
๐ You can grab them here:
https://github.com/OPQAM/MigratingCoconuts/tree/master/Python_Rebuild/Week_3
Playing with the least significant bits of my weekend
๐ Experimenting with steganography โ hiding messages inside simple image and sound files.
Iโm building a Python script to embed and extract hidden data, mostly to better understand binary manipulation and file formats. ๐ต๏ธโโ๏ธ
Beats working out at the gym.
So it goes. Part I
๐งฉ Been poking at eval() and exec() in Python โ they're deceptively powerful. One stray input and you're one __import__ away from a shell.
Remote Code Execution (RCE) isnโt just old news โ itโs still real, still nasty in the wrong hands.
๐ฒ Pythonโs ASTs let you trace what a script really does without running it โ but just one layer of obfuscation, and they fall apart.
Small tools, deep cuts. Keep digging.
New Blog Post: Why Wonโt You Power Off?
Linux wouldnโt shut down my ThinkPad x260.
โ It wasnโt heat.
โ It wasnโt ACPI.
โ It was the TPM.
๐ ๏ธ Troubleshooting recap
โ๏ธ BIOS tweaks
โ Real fix that worked
๐ https://dreaming-of-dragons.blogspot.com/2025/05/why-wont-you-power-off.html
โ๏ธ Ever opened an email and felt like... someone knew?
A friend of mine was on vacation when a client emailed her โ and later followed up with:
"I know you opened our email. Can you please reply?"
She hadnโt replied. Just opened the email.
So... how did they know?
You might want to learn more about the spy pixel.
It's cool stuff, I promise:
๐ How a Spy Pixel Crashed Into My Friend's Vacation
๐ https://dreaming-of-dragons.blogspot.com/2025/04/how-spy-pixel-crashed-into-my-friends.html
๐ "Securing Your Website (Part 2): Cloudflare Tunnels, WAF Traps, and More Hands-On Security"
So, after setting up Cloudflare Tunnels to bypass my ISP restrictions and adding some basic WAF rules, I kept digging some more into Cloudflare's security features.
๐ Automating tunnel restarts with systemd
๐ Testing custom WAF rules to trap bots.
๐ Experimenting my own rules for loopholes.
๐ https://dreaming-of-dragons.blogspot.com/2025/03/securing-your-website-part-2-cloudflare.html