Avatar

Sunny Mishra (codacker)

Student

Biography

Sunny Mishra is a B.Sc. (Hons) Computer Science final year student with interests in cyber security and cloud infrastructure. He has been part of infosec community for more than 2 years. He likes to play CTF’s and create CTF challenges. He is one of the founding members of CTF team abs0lut3pwn4g3 and also core member of DC91120(Def Con Community Group).

Codacker

Interests

  • Network Pentesting
  • Web Application Pentesting
  • Malware Analysis
  • Exploit Development
  • Cloud Infrastructure

Education

  • B.Sc. Hons Computer Science, 2020

    College of Vocational Studies, University of Delhi

Skills

Python

C/C++

Java

PHP

Pentesting

Exploit Development

Malware Analysis

Docker

Accomplish­ments

Architecting with Google Compute Engine Specialization

See certificate

Kubernetes in the Google Cloud

See certificate

All 12 Active Badges

See certificate

Recent Posts

HTB Luke Writeup

Luke Recon Nmap Scan We begin our reconnaissance by running an Nmap scan checking default scripts and testing for vulnerabilities. nmap …

Protostar Heap-2 Writeup

Heap 2 Source code The following is the source code for Heap 2 Challenge #include <stdlib.h> #include <unistd.h> #include …

Protostar Heap-1 Writeup

heap 1 Source code The following is the source code for Heap 1 Challenge #include <stdlib.h> #include <unistd.h> #include …

Projects

*

RTB CTF Framework

An framework written in python flask created to help organizing and managing Root the box style CTF’s

Train Enquiry System

A Desktop Application written in java using Swing UI, to get live status of trains in India using API provided by railwayapi.com

Xor Encryptor

A Basic file encryptor written using C++ with UI provided by QT framework

Recent Publications

Sig-return Oriented Programming

In this article I went through the technique of sig-return oriented programming which can be used to exploit buffer overflow attacks …

anti-RE for fun

In this article we went through a lot of different techniques that can be used to obfuscate a binary so that an attacker cannot easily …