Binary Exploitation ELI5 — Part 3“To err is human… to really foul up requires the root password.”May 24, 20182May 24, 20182
Binary Exploitation ELI5 — Part 2“ Wait a minute. Using an RX modulator, I might be able to conduct a mainframe cell direct and hack the uplink to the download.” —…May 2, 20181May 2, 20181
Published inInfoSec Write-upsBOLO: Reverse Engineering — Part 1 (Basic Programming Concepts)Throughout the reverse engineering learning process I have found myself wanting a straightforward guide for what to look for when browsing…Apr 16, 20186Apr 16, 20186
Covert Channels DemystifiedRecently as a result of the release of the Spectre and Meltdown vulnerabilities/attacks as well as the new X.509 based data exfiltration…Feb 6, 20181Feb 6, 20181
2018: The Year of the ThreatIn remarks given at the FBI International Conference on Cyber Security, FBI Director Christopher Wray cited Cryptocurrency, advanced…Jan 16, 2018Jan 16, 2018
WPA3: What is it and what it means for youYesterday (1/8/2018), the Wi-Fi Alliance announced the newest Wi-Fi security protocol, WPA3. After last year’s KRACK Wi-Fi vulnerability —…Jan 10, 2018Jan 10, 2018
Published inHackerNoon.comExplain Spectre and Meltdown Like I’m 5Over the last couple of days, two major vulnerabilities — Spectre and Meltdown — have surfaced. These vulnerabilities, which affect nearly…Jan 8, 20181Jan 8, 20181