Category Security
Kernel Exploitation Part One
This post reflects my notes and additional thoughts about the first lecture about kernel exploitation of pwn.
Kernel Exploitation Sidenotes
Because I already knew a bit of hardware-related operation and you often find code statements like the following:
Kernel Exploitation Intro
One of my plans was to learn about security[0]. My ToDo list is massively full of different topics I want to put some attention on.
Generic Software is an attack avenue
As you may or may not know, one quite big hack went through the media lately, Solar Wind[0][1].
Learning Security
Security is a weird topic. For once it does not consist of defined field of its own, but instead is a generic one found in other field.
16.07.2020 - link drop
Risky Business #580 – Czech spear phishing spurs fightin’ words from Pompeo - Risky Business How I Got My Attention Back — by Craig Mod Security Conversations: Dave Aitel, Founder and CEO, Immunity Written communication is remote work super power - Snir David Blog Going Dark: Looking for the End of the Internet, Part 2: Rediscovering the Beauty of Text on the Internet How to foster ‘shoshin’ | Psyche Guides Are human beings naturally lazy?
06.07.2020 - link drop
Risky Business #580 – Czech spear phishing spurs fightin’ words from Pompeo - Risky Business How I Got My Attention Back — by Craig Mod Security Conversations: Dave Aitel, Founder and CEO, Immunity Written communication is remote work super power - Snir David Blog Going Dark: Looking for the End of the Internet, Part 2: Rediscovering the Beauty of Text on the Internet How to foster ‘shoshin’ | Psyche Guides Are human beings naturally lazy?
13.05.2020 - link drop
How to enable SSH access using a GPG key for authentication | Opensource.
01.05.2020 - link drop
media.ccc.de - What The Fax?!
16.03.2020 - link drop
Slack Bug Allowed Automating Account Takeover Attacks