Binary Exploitation ELI5 — Part 3“To err is human… to really foul up requires the root password.”May 24, 20181422May 24, 20181422
Binary Exploitation ELI5 — Part 2“ Wait a minute. Using an RX modulator, I might be able to conduct a mainframe cell direct and hack the uplink to the download.” —…May 2, 20182381May 2, 20182381
Published inHackerNoon.comBinary Exploitation ELI5– Part 10x00 — PrefaceApr 30, 2018381Apr 30, 2018381
BOLO: Reverse Engineering — Part 2 (Advanced Programming Concepts)PrefaceApr 22, 20186601Apr 22, 20186601
Published inInfoSec Write-upsBOLO: Reverse Engineering — Part 1 (Basic Programming Concepts)Throughout the reverse engineering learning process I have found myself wanting a straightforward guide for what to look for when browsing…Apr 16, 20181.2K6Apr 16, 20181.2K6
Covert Channels DemystifiedRecently as a result of the release of the Spectre and Meltdown vulnerabilities/attacks as well as the new X.509 based data exfiltration…Feb 6, 20181121Feb 6, 20181121
2018: The Year of the ThreatIn remarks given at the FBI International Conference on Cyber Security, FBI Director Christopher Wray cited Cryptocurrency, advanced…Jan 16, 201883Jan 16, 201883
WPA3: What is it and what it means for youYesterday (1/8/2018), the Wi-Fi Alliance announced the newest Wi-Fi security protocol, WPA3. After last year’s KRACK Wi-Fi vulnerability —…Jan 10, 201896Jan 10, 201896
Published inHackerNoon.comExplain Spectre and Meltdown Like I’m 5Over the last couple of days, two major vulnerabilities — Spectre and Meltdown — have surfaced. These vulnerabilities, which affect nearly…Jan 8, 20181491Jan 8, 20181491