Posts by Category

Cryptography

One-Time Pad

5 minute read

I hear about this a lot when looking into cryptography, usually in reference to the possibility of perfect security. So what is a one-time pad?

Old School Cryptography

3 minute read

Cryptography, the methodology of concealing the content of messages, comes from the Greek root words kryptos, meaning hidden and graphikos, meaning writin...

Back to Top ↑

Methodology

Side-Channel Attacks

18 minute read

A side-channel attack is any attack that is based on gaining information from the physical system that a process is being implemented on. Rather than an expl...

Back to Top ↑

Vulnerability

Dirty COW CVE-2016-5195

17 minute read

Why is it called Dirty COW? COW stands for Copy-On-Write, and the exploit is so named because it’s a race condition that was found in the way the Linux kerne...

Back to Top ↑

Capture the Flag

PicoCTF 2018

21 minute read

General Skills General Warmup 1 ASCII = American Standard Code for Information Interchange ASCII uses numbers to represent various characters required for...

Back to Top ↑

Privacy

Privacy Measures

8 minute read

There is a philosophical principle that explains that each event, each living being, each object, each person, or each circumstance has the characteristic of...

Back to Top ↑

UNIX

Shell Commands

3 minute read

These lists will be all over the internet, just lists of commands and what they do. This is just a comprehensive list of the ones that I’ve used or found use...

Back to Top ↑