|
You are here |
cocomelonc.github.io | ||
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | [AI summary] The CTF writeup details the process of solving a cryptographic challenge involving AES key recovery through side-channel attacks. The key was recovered by analyzing timing leaks from the AES decryption process, specifically the doSboxInv function's execution time. The recovered round 10 key was then used to invert the AES key schedule to obtain the original encryption key, which was the flag. The writeup also discusses the challenges of directly recovering the original key due to timing noise and the importance of using statistical correlation to identify the correct key. | |
| | | | |
wsummerhill.github.io
|
|
| | | | | I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly. | |
| | | | |
int10h.org
|
|
| | | | | Font: IBM DOS ISO8-2x, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles | |
| | | | |
blog.slaks.net
|
|
| | | [AI summary] The text provides an extensive overview of various programming and web development topics, including ASP.NET, C#, Razor, jQuery, and more. It discusses concepts like Razor engine and WebPages framework, connection string construction, optional parameters in C# 4.0, HTML encoding, and the intricacies of ASP.NET page parsing. It also touches on jQuery DOM manipulation, DataTables, and best practices for handling connection strings. The text is highly technical, covering both theoretical aspects and practical implementations across different technologies. | ||