author

Ravshan Rikhsiev — Cybersecurity researcher | Low-level systems, firmware & compilers

I’m a cybersecurity researcher at ONESEC focused on low-level systems, firmware, and compilers. I publish technical writeups, run hands-on workshops, and mentor students to help grow the next generation of security researchers. Outside work I enjoy cycling and community outreach.

split | ROPEmporium [2]


In this challenge, we should run system() function with argument /bin/cat flag.txt
Read more ⟶

ret2win | ROPEmporium [1]


One common introductory ROP challenge is known as ret2win. The goal is to call a specific function in the program called ret2win, which prints a success message and reveal a flag.txt…
Read more ⟶

Full-Technical Analysis of DcRAT: Dissecting the Stealth, Persistence, and Power of DarkCrystal RAT


A deep technical exploration of DcRAT’s architecture, revealing how it disables system logging, harvests credentials, profiles compromised hosts, and communicates with its C2 infrastructure. This report illustrates the layered tactics that make DcRAT a persistent and adaptable threat in modern cyberattacks.
Read more ⟶

How to catch smart hackers? Honeypots


This post explains how honeypots attract and study attacker behavior by simulating vulnerable systems. It describes deployment strategies, common attacker patterns, and how the collected data improves defensive detection.
Read more ⟶

Heap Overflow in assimp


A detailed breakdown of a heap overflow in the assimp library triggered by malformed model files. The post walks through code paths, root cause analysis, and practical exploitation considerations.
Read more ⟶

CVE-2021-38003 The Hole Leak to RCE


Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Read more ⟶

CVE-2020-6418 Type Confusion V8


Type confusion in V8 in Google Chrome prior to 80.0.3987.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Read more ⟶

CVE-2019-5782 Out-Of-Bounds V8


Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Read more ⟶

V8 Internals: Tree


A conceptual overview of V8’s internal structures ...
Read more ⟶

Getting Started with Embedding V8


A beginner-friendly guide to embedding the V8 JavaScript engine into native applications. It covers initialization, contexts, script execution, and common pitfalls when integrating V8 with C++ projects.
Read more ⟶