About:

Alberto Ventafridda is a developer passionate about cybersecurity, web development, and cloud architectures, with a focus on binary exploitation and technical writing.

Website:

Specializations:

Interests:

Cybersecurity Web development Cloud architectures Binary exploitation Technical writing

Outgoing Links:

Subscribe to RSS:
The text is the second part of a series on implementing fast TCP fingerprinting in a golang webserver using eBPF. It focuses on the actual development, including the golang side and the eBPF side. The author discusses the differen...
The article documents the implementation of fast TCP fingerprinting in a golang webserver using eBPF. It discusses the technical challenges and provides a background on TCP fingerprinting, as well as the development and testing of...
The text is about solving a code challenge on the Traefik website. The author reverse-engineered a Golang executable from a Docker container, deployed it in a minikube cluster, and extracted a secret payload from the executable. T...
The text is an interactive guide to x86-64 assembly, focusing on the first assembly instructions and visualizing the way data moves in memory when executed. It explains the mov instruction, memory alignment, endianness, and the st...
The text discusses the issue of receiving spam messages from people scraping github repositories for emails. It explains how the email used in commits is publicly visible in a public repository and provides solutions to prevent sp...
The text provides an opinionated way to manage SSH keys, explaining the benefits of using SSH keys, how to generate a key pair, the case for using dedicated SSH keys, avoiding SSH keys on the cloud, using SSH alias, and managing m...
The text is an interactive guide to x86-64 assembly, focusing on understanding the way data moves behind the scenes when executing a program. It covers topics such as hexadecimal numbers, ASCII encoding, memory, registers, and ass...
The text is a writeup about a web challenge called calc from PingCTF 2023. It discusses a logic bug and unintended workarounds based on inconsistencies in the esprima.js parser. The challenge involves finding a reflected xss and s...
The text explains how to escape a pyjail without using ASCII characters and numbers. It provides a detailed explanation of the challenge, the security check function, and how to bypass the filter using UTF-8 identifiers. It also i...
The post explains two workflows for debugging with pwntools, the safest and the elegant workflow. It also covers tmux integration, interactive python shell, and gdbscript. The author provides a template script that includes everyt...
This guide provides nuclear physicists with the minimal information required to write C programs that interface to CAMAC systems. It explains what a CAMAC system is, how to issue CAMAC commands, control a CAMAC crate with a C prog...
The text is a writeup of a web challenge for the cyberchallenge CTF that took place in Italy in 2019. The challenge was to exploit an SQL injection vulnerability in the mod_insecurity 2.0 web application firewall (WAF) module for ...
The article provides an overview of the technologies used to create a personal website, including the tech stack, deployment pipeline, and the reasons for choosing Astro. It also discusses the features of Astro and its comparison ...