Category Security

Log4Shell part two

I did not have much time to get to the log4j exploitation part.

Log4Shell

Okay, at this point you already have heard of the new hot shit in the infosec: Log4shell or CVE-2021-44228.

AES GCM

Some days ago, we had an interesting discussion about Galois/Counter Mode (GCM).

26.10.2021 - link drop

Breaking the News: New York Times Journalist Ben Hubbard Hacked with Pegasus after Reporting on Previous Hacking Attempts - The Citizen Lab

Faceboom

You may or may not have heard from the ‘Slashdot effect’[0].

Kernel Exploitation Part Six

This post is the sixth and last part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part Five

This post is the five part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part Four

This post is the fourth part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part Three

This post is the third part of my notes from the lecture about kernel exploitation of pwn.

Kernel Exploitation Part Two

This is the secound part of my notes from the lecture about kernel exploitation of pwn.