|
You are here |
wsummerhill.github.io | ||
| | | | |
cocomelonc.github.io
|
|
| | | | | ||
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | [AI summary] The CTF writeup details the process of solving a cryptographic challenge involving AES key recovery through side-channel attacks. The key was recovered by analyzing timing leaks from the AES decryption process, specifically the doSboxInv function's execution time. The recovered round 10 key was then used to invert the AES key schedule to obtain the original encryption key, which was the flag. The writeup also discusses the challenges of directly recovering the original key due to timing noise and the importance of using statistical correlation to identify the correct key. | |
| | | | |
thewover.github.io
|
|
| | | | | TLDR: Presenting DInvoke, a new API in SharpSploit that acts as a dynamic replacement for PInvoke. Using it, we show how to dynamically invoke unmanaged code from memory or disk while avoiding API Hooking and suspicious imports. | |
| | | | |
embedded.fm
|
|
| | | Today, we got a question regarding programming C and the necessity of knowing the assembly language of the processor that we are working on. | ||