23 March 2026

Linux Process Evasion: ptrace & prctl

Anti-Analysis 101: Understanding ptrace and prctl Evasion Techniques in Linux

In cybersecurity research and Red Team simulations, developing custom tools requires a deep understanding of host-based evasion. When an agent lands on a target system, modern Blue Teams and Endpoint Detection and Response (EDR) solutions will attempt to attach a disassembler or a debugger to analyze the suspicious process.

How do these processes defend themselves against analysis? In this article, we will explore the technical details of how the Linux kernel's own mechanisms—ptrace and prctl—can be utilized for process self-defense, strictly using pure x64 Assembly.

11 March 2026

Network Fingerprinting: Analyzing Default ICMP Structures and Payload Mimicry

Network Fingerprinting: Analyzing Default ICMP Structures and Payload Mimicry

Research Context

"In advanced network observability, understanding the default behavior of various operating systems is vital for traffic profiling. This article explores the structural differences in ICMP Echo Requests across different OS environments and analyzes how 'Traffic Mimicry' can be used to evaluate the accuracy of Network Intrusion Detection Systems (NIDS)."

1. The Anatomy of an ICMP Signature

A standard ICMP Echo Request is not just a simple signal; it carries a specific "fingerprint" based on the operating system that generated it. These fingerprints consist of:

  • Total Packet Size

  • TTL (Time to Live) values

  • Default Payload Content

2. Cross-Platform Discrepancies (Linux vs. Windows)

When a system sends a "ping," the default data size ($D$) and the total packet length ($L$) vary significantly between architectures. 

Feature Linux (Typical) Windows (Typical)
Data Size ($D$) 56 Bytes 32 Bytes
ICMP Header ($H$) 8 Bytes 8 Bytes
Total ICMP Length ($L$) 64 Bytes 40 Bytes
Default Payload Timestamp + Data abcdefg...

Statistical Jitter and Timing Analysis: Precision Measurements in Network Protocols

 Statistical Jitter and Timing Analysis: Precision Measurements in Network Protocols

Research Context

"In high-speed data transmission, the consistency of packet arrival is as critical as the speed itself. This article explores the mathematical foundations of Jitter (Delay Variation) and provides a technical analysis of how low-level timing mechanisms, such as the x64 RDTSC instruction, can be utilized to evaluate network stability and detect structural timing inconsistencies."


1. Fundamentals: Latency vs. Jitter

To analyze network behavior, we must distinguish between two primary metrics:

  • Latency (Delay): The time taken for a data packet to travel from source to destination.

  • Jitter (Packet Delay Variation): The statistical variance in the delay of received packets.

Mathematically, if $D_i$ is the delay of the $i$-th packet, Jitter ($J$) is often calculated as the absolute difference between consecutive delays:

$$J = |D_i - D_{i-1}|$$

Volatile Storage Mechanisms: A Deep Dive into memfd_create for Memory-Resident Operations

 Volatile Storage Mechanisms: A Deep Dive into memfd_create for Memory-Resident Operations

Research Context

"In high-performance computing and modern system auditing, reducing disk I/O overhead is critical for operational efficiency. This article examines the memfd_create system call—a mechanism designed to create anonymous, volatile files that reside exclusively in RAM, providing a secure and fast alternative to traditional disk-based temporary storage."


1. The Problem with Physical Storage

Traditional temporary files (usually stored in /tmp) require disk interaction, which introduces latency and leaves a physical footprint on the storage medium. In scenarios requiring high volatility and data privacy, physical disk traces are undesirable. memfd_create solves this by providing a file descriptor that points to an anonymous file in the RAM-backed tmpfs.

eBPF: The Evolution of Linux Kernel Observability and Programmability

 Introduction to eBPF: The Evolution of Linux Kernel Observability and Programmability

Research Context

"As system complexity grows in cloud-native environments, traditional monitoring tools often face performance bottlenecks. This article explores eBPF (Extended Berkeley Packet Filter), a revolutionary technology that allows for safe, high-performance programmability within the Linux Kernel without changing the kernel source code or loading kernel modules."

1-The Conceptual Shift: What is eBPF?

Historically, modifying the behavior of the Linux Kernel required either changing the kernel source code (a years-long process) or loading Kernel Modules (LKM), which carry the risk of system instability. eBPF introduces a third way: a sandboxed virtual machine inside the kernel that can execute custom bytecode at specific "hook points."

Originally designed for network packet filtering, eBPF has evolved into a general-purpose execution engine. It allows developers to run logic directly in the kernel space, ensuring minimal overhead and maximum observability.

10 March 2026

Covert Network Communication Analysis

 Invisible Exfiltration: Advanced Evasion Techniques in Modern IDS/IPS Environments

In the evolving landscape of cybersecurity, detection mechanisms have shifted from simple signature matching to complex behavioral heuristics and Deep Packet Inspection (DPI). For security researchers, achieving true "stealth" requires more than just encryption; it requires blending into the background noise of the network.

Here is a technical deep dive into the evasion strategies used to bypass modern Intrusion Detection Systems (IDS) and Endpoint Detection and Response (EDR) solutions.

06 March 2026

Linux x64 Assembly: The Anatomy of Syscalls and the Secrets of the .bss Segment

 Linux x64 Assembly: Syscalls and .bss Segment


If you are messing around with Assembly, the most direct way to talk to the processor is through the Syscall (System Call) mechanism. Opening a file, reading from a keyboard, or printing text to a terminal... it all starts with a formal request to the Kernel. Today, we are going behind the scenes to examine the open, read, and exit calls, how registers manage data flow, and why the .bss segment is your best friend for memory management.

04 March 2026

🚀 ICMP-Ghost: A Technical Analysis of Low-Level Network Communication in x64 Assembly

 ICMP-Ghost: Low-Level Remote Management Interface in x64 Assembly


In the field of cybersecurity research, optimizing system integrity and minimizing the operational footprint are crucial for accurate environment analysis. Today, we are exploring a project focused on volatile memory execution and non-traditional communication protocols: ICMP-Ghost. This project serves as a technical proof-of-concept for building a minimalist remote management interface using low-level Assembly methods to ensure high efficiency and low system impact.

03 March 2026

🚀 RFC 1071 Standards : Checksum with x64 Assembly

 Data Sealing to RFC 1071 Standards: Anatomy of a Checksum with x64 Assembly

As the development of my ICMP-based Network Communication Project continues at full throttle, today I want to talk about the most "diplomatic" part of the operation: the Checksum. If you don't stamp this seal correctly on the packet you're sending, the Target host's operating system treats your packet as a "Malformed data" and dumps it in the trash before it even gets through the door.

So, how exactly is this "seal" calculated in a low-level language? Let's examine it step-by-step through the very algorithm I wrote and currently use in my project.

28 February 2026

🚀 Deep Dive into Assembly: Efficient Single-Pass IP-to-String Conversion


Network Programming in Assembly: A Single-Pass Algorithm for Printing IP Addresses

When doing low-level network programming in Assembly, you experience firsthand the immense chaos running behind the scenes of operations we solve with a single line in high-level languages (Python, C, etc.). While developing the Nested-ICMP-Communication Analysis project, specifically an Encapsulated ICMP framework, I hit exactly this kind of wall: extracting an IP address from a packet header and printing it to the screen in the correct format.

Sounds simple, right? However, when x86 architecture and network protocols are involved, seeing 5.1.168.192 instead of 192.168.1.5 on your terminal is extremely common.

So why does this happen, and what kind of algorithm did I develop to overcome this issue during the debugging process? Let's dive into the background.

🚀 Raw ICMP Sniffing with x64 Assembly

 

🚀 Building a Low-Level ICMP Sniffer in x64 Assembly (Raw Sockets)

Introduction

In the realm of network security and packet analysis, tools like Python (Scapy) or C are the usual go-tos. However, when we want to strip away all abstraction layers from the OS network stack and talk directly to the processor, resources become incredibly scarce. Finding modern, zero-dependency networking tools written in x64 Assembly on the internet is almost impossible today.

In this post, we will explore the architecture and design decisions behind my x64 Assembly-based ICMP Sniffer project, completely rejecting standard C libraries (libc) and relying purely on direct Linux system calls (syscalls).

26 February 2026

🚀 Udisks2 CVE-2025-6019

🚀 New Vulnerability Analysis: Access Control Vulnerability Analysis in Udisks2

In the world of Linux system security, Race Conditions have always been one of the most dangerous and fascinating vulnerability classes to exploit. Today, I want to discuss my latest Proof of Concept (PoC) published on GitHub: CVE-2025-6019 - udisks2 XFS Resize TOCTOU Privilege Escalation.

In this project, I demonstrate how a "Time-of-Check to Time-of-Use" (TOCTOU) vulnerability during the resizing of XFS filesystems by the udisks2 service can be implemented as a PoC to achieve Local Privilege Escalation (LPE).

🚀 Nested-ICMP-Communication Analysis: Vulnerability Research on ICMP Encapsulation

    

🚀 Nested-ICMP-Communication Analysis: Vulnerability Research on ICMP Encapsulation


Research Objectives

"This project is designed to help Red Team operators and Blue Team defenders understand non-traditional protocol encapsulation. The goal is to improve network anomaly detection systems by identifying edge-case vulnerabilities in packet parsing logic."


Introduction

In the evolving landscape of network security, focus often remains on TCP and UDP protocols. However, the Internet Control Message Protocol (ICMP), frequently associated with basic diagnostic tests, offers a sophisticated architecture for advanced network protocol research.

In this post, I will introduce my latest project: Nested-ICMP-Communication Analysis. We will perform a technical deep dive into how data can be "nested" within ICMP structures to evaluate modern security boundaries.

Linux Process Evasion: ptrace & prctl

Anti-Analysis 101: Understanding ptrace and prctl Evasion Techniques in Linux In cybersecurity research and Red Team simulations, developing...