Explore >> Select a destination


You are here

gebir.ge
| | pentestlab.blog
4.1 parsecs away

Travel
| | Microsoft Office is the most popular product in Windows operating systems since it allows users to write and edit documents, create and present slides, gather notes, sent emails and perform calculations. Corporate laptops and workstations have Microsoft Office installed by default to allow employees perform the majority of their tasks on a daily basis. However...
| | wsummerhill.github.io
3.8 parsecs away

Travel
| | Malware Development Introduction (aka Malware Dev 101), Part 1
| | taeluralexis.com
1.3 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | rot256.dev
23.3 parsecs away

Travel
| A walk-through of real-world AES fault injection for dummies on a shoestring budget. Introduction In the post we will setup a microcontroller which encrypts using AES with an unknown key, then explore how to recover the full AES key from simply (randomly) glitching the power-supply which will introduce faults in the arithmetic during the computation of AES encryption. This post is designed to serve as a tutorial and enable the reader to follow along.