|
You are here |
0xcybery.github.io | ||
| | | | |
forensicitguy.github.io
|
|
| | | | | In this post I want to take a look at a PowerShell-based Cobalt Strike beacon that appeared on MalwareBazaar. This particular beacon is representative of most PowerShell Cobalt Strike activity I see in the wild during my day job. The beacons often show up as service persistence during incidents or during other post-exploitation activity. If you want to follow along at home, the sample I'm using is here: | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | [AI summary] The CTF writeup details the process of solving a cryptographic challenge involving AES key recovery through side-channel attacks. The key was recovered by analyzing timing leaks from the AES decryption process, specifically the doSboxInv function's execution time. The recovered round 10 key was then used to invert the AES key schedule to obtain the original encryption key, which was the flag. The writeup also discusses the challenges of directly recovering the original key due to timing noise and the importance of using statistical correlation to identify the correct key. | |
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
pingbin.com
|
|
| | | [AI summary] The provided content outlines a comprehensive guide for deploying C# ASP.NET Core 6.0 applications to an Ubuntu server using GitHub Actions CI/CD, with NGINX as a reverse proxy and MySQL as an optional database. It includes steps for setting up a virtual machine, installing .NET Core, configuring NGINX, setting up MySQL, and automating the deployment process with GitHub Actions. | ||