|
You are here |
blog.trailofbits.com | ||
| | | | |
notsosecure.com
|
|
| | | | | In this blog post we will discuss a case study where we were successful in exploiting a faulty password reset functionality. The end result was that we were able to set a newpassword onany arbitrary user account. We could do this because of a weak cryptographic implementation, in this case the functionality was utilising Electronic Code Book (ECB) mode encryption. | |
| | | | |
educatedguesswork.org
|
|
| | | | | ||
| | | | |
www.netmeister.org
|
|
| | | | | It's 2024 - do you know where your post-quantum cryptography is? | |
| | | | |
abhinavomprakash.com
|
|
| | | Defining recursion in terms of itself is an old joke among programmers. Despite the fact that it frustrates a lot of new-comers, we don't change it. I like to define recursion as "Iteration for the cool kids". I don't mean this in a snobbish, let-us-exclude-the-for-loopers kinda way, but rather in a tone of appreciation. Recursion is an elegant way of doing things. Recursive alogrithms are concise, have less noise and have immutability baked in (always a plus). | ||