Category Security
Log4Shell part two
I did not have much time to get to the log4j exploitation part.
Log4Shell
Okay, at this point you already have heard of the new hot shit in the infosec: Log4shell or CVE-2021-44228.
AES GCM
Some days ago, we had an interesting discussion about Galois/Counter Mode (GCM).
26.10.2021 - link drop
Breaking the News: New York Times Journalist Ben Hubbard Hacked with Pegasus after Reporting on Previous Hacking Attempts - The Citizen Lab
Faceboom
You may or may not have heard from the ‘Slashdot effect’[0].
Kernel Exploitation Part Six
This post is the sixth and last part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part Five
This post is the five part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part Four
This post is the fourth part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part Three
This post is the third part of my notes from the lecture about kernel exploitation of pwn.
Kernel Exploitation Part Two
This is the secound part of my notes from the lecture about kernel exploitation of pwn.