|
You are here |
corvid.cafe | ||
| | | | |
blog.netlab.360.com
|
|
| | | | | The Log4j vulnerability that came to light at the end of the year can undoubtedly be considered a major event in the security community. Honeypot and botnet are our bread and butter, and we have been concerned about which botnets would be exploiting this since the vulnerability was made public. | |
| | | | |
briancallahan.net
|
|
| | | | | ||
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] The provided text describes a C/C++ implementation of the Khufu encryption algorithm, used to encrypt and decrypt a payload for a potential malicious purpose. The code demonstrates how to use the algorithm to encrypt a shellcode payload, execute it via Windows APIs, and avoid detection by AV engines. Key points include the encryption process, the use of Windows API functions for execution, and the limited AV detection due to obfuscation and API calls rather than encryption. The text also mentions the resistance of Khufu to differential cryptanalysis but notes that a 16-round attack exists. The example is for educational purposes only. | |
| | | | |
becomesovran.com
|
|
| | | My post on how I like to manage servers. I cover SSH, networking, log rotation, and server management basics. | ||