You are here |
dsat.igada.de | ||
| | | |
rcoh.me
|
|
| | | | I always wondered how Google Authenticator style 2-factor codes worked. The process of going from QR code to rotating 6-digit pin seemed a bit magical. A few days ago, my curiosity found itself coupled with some free time. Here's what I found: What's in the QR Code I scanned the QR code from Github with a barcode scanning app. Here's what's inside: otpauth://totp/Github:rcoh?secret=onswg4tforrw6zdf&issuer=Github Not too surprising. It tells us the protocol, TOTP, who is issuing this OTP code (Github), and most importantly the secret:1 | |
| | | |
wachter-space.de
|
|
| | | | Solution to the Cyber Security Rumble Finals challenge simple-asm. The challenge is strait forward. It defines an custom set of instructions, that get translated to x64 instructions directly and are then executed at a fixed offset, in a no-PIE binary. The translation lacks checks, such that the instructions do more than they should at first sight, when using specific higher register. This is the provides challenge source code, also running on the remote instance: | |
| | | |
ayende.com
|
|
| | | | In the previous post, I discussed FastPFor encoding, now I'm going to focus on how we deal with decoding. Here is the decode struct: Note that t... | |
| | | |
techsavvypriya.wordpress.com
|
|
| | 1 post published by Priya Pareek on June 26, 2020 |