Category Security

Kernel Exploitation Part One

This post reflects my notes and additional thoughts about the first lecture about kernel exploitation of pwn.

Kernel Exploitation Sidenotes

Because I already knew a bit of hardware-related operation and you often find code statements like the following:

Kernel Exploitation Intro

One of my plans was to learn about security[0]. My ToDo list is massively full of different topics I want to put some attention on.

Generic Software is an attack avenue

As you may or may not know, one quite big hack went through the media lately, Solar Wind[0][1].

Learning Security

Security is a weird topic. For once it does not consist of defined field of its own, but instead is a generic one found in other field.

16.07.2020 - link drop

Risky Business #580 – Czech spear phishing spurs fightin’ words from Pompeo - Risky Business How I Got My Attention Back — by Craig Mod Security Conversations: Dave Aitel, Founder and CEO, Immunity Written communication is remote work super power - Snir David Blog Going Dark: Looking for the End of the Internet, Part 2: Rediscovering the Beauty of Text on the Internet How to foster ‘shoshin’ | Psyche Guides Are human beings naturally lazy?

06.07.2020 - link drop

Risky Business #580 – Czech spear phishing spurs fightin’ words from Pompeo - Risky Business How I Got My Attention Back — by Craig Mod Security Conversations: Dave Aitel, Founder and CEO, Immunity Written communication is remote work super power - Snir David Blog Going Dark: Looking for the End of the Internet, Part 2: Rediscovering the Beauty of Text on the Internet How to foster ‘shoshin’ | Psyche Guides Are human beings naturally lazy?

13.05.2020 - link drop

How to enable SSH access using a GPG key for authentication | Opensource.

01.05.2020 - link drop

media.ccc.de - What The Fax?!

16.03.2020 - link drop

Slack Bug Allowed Automating Account Takeover Attacks