Explore >> Select a destination


You are here

wsummerhill.github.io
| | niemczuk.tech
4.3 parsecs away

Travel
| | Everyone should be familiar with the concept of brute forcing. In short it is an action of trying every possible combination till succeeding. Most often used in password hacking / hash guessing.
| | blog.dornea.nu
3.7 parsecs away

Travel
| | [AI summary] The blog post discusses the process of creating and executing a shellcode in C to read a file named 'flag.txt' and dump its content, including assembly code, compilation steps, and execution considerations.
| | cocomelonc.github.io
2.0 parsecs away

Travel
| | [AI summary] The article explains how to write and execute shellcode on macOS using Assembly and C, highlighting differences from Linux and the need for mmap to allocate executable memory.
| | www.da.vidbuchanan.co.uk
23.4 parsecs away

Travel
| [AI summary] The CTF writeup details the process of solving a cryptographic challenge involving AES key recovery through side-channel attacks. The key was recovered by analyzing timing leaks from the AES decryption process, specifically the doSboxInv function's execution time. The recovered round 10 key was then used to invert the AES key schedule to obtain the original encryption key, which was the flag. The writeup also discusses the challenges of directly recovering the original key due to timing noise and the importance of using statistical correlation to identify the correct key.