Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: John Smith

Can I decrypt my SD card as phone died

Posted on April 3, 2019 by John Smith

The mainboard of my s7 passed away and i need to decrypt my SD card. Does Samsung store the keys in their cloud? Is there any way to decrypt the card? I can’t believe that once the phone dies (mb, whatever), the user loose im… Continue reading Can I decrypt my SD card as phone died→

Posted in Android, sd card

Why do we need to remove null bytes from shell code?

Posted on April 30, 2018 by John Smith

I’m studying the basics of making shell codes. I have a question about it.

In my textbook, the author stores his shell code in an environment variable, and injects the address of it using strcpy() in a program.
When he mak… Continue reading Why do we need to remove null bytes from shell code?→

Posted in assembly, Shellcode, stack overflow

How to make a OSPF LSA Spoofing attack in GNS3

Posted on July 13, 2017 by John Smith

I have read recently that OSPF LSA packets can be modified and used to spoof the network. Is there any way to do it ? I have few ideas of writing python code., but I am not sure how to inject that packet into gns3. Can someon… Continue reading How to make a OSPF LSA Spoofing attack in GNS3→

Posted in arp-spoofing, dns spoofing, ip-spoofing, OpenSSL | Tagged spoofing

What hardware can a user-mode process access?

Posted on March 2, 2017 by John Smith

What hardware if any can a process in user-mode (as opposed to kernel mode) access without using system calls, e.g. without relying on the OS to do anything for it? This question should be operating system independent since I… Continue reading What hardware can a user-mode process access?→

Posted in kernel, process

Designing a sandbox or how to "perfectly" isolate an app?

Posted on March 2, 2017 by John Smith

I have been thinking on how an app could be “perfectly” isolated from the rest of the system. Now I know we will never achieve “perfect” in practice, but in theory, how could one go about it? I put together a few thoughts:

… Continue reading Designing a sandbox or how to "perfectly" isolate an app?→

Posted in Isolation, Operating Systems, sandbox

How to avoid Traffic Analysis by generating unique response everytime?

Posted on February 4, 2017 by John Smith

Nowadays lots of big websites are using traffic analysis fingerprinting. They check/compare the response of every user’s packets size, type, frequency time interval/duration to the set of responses they have already available… Continue reading How to avoid Traffic Analysis by generating unique response everytime?→

Posted in cryptanalysis, surveillance, user-tracking

How fast can SHA-1 be brute forced when used with a secret?

Posted on October 18, 2016 by John Smith

In my code I calculate hashes for known codes and a secret with SHA-1:

SHA-1(code + secret) = hash

A attacker can do statistical analysis on the database and for example guess that the code 03220 produces a specific output.

SHA-1(03220… Continue reading How fast can SHA-1 be brute forced when used with a secret?→

Posted in hash, sha

Encrypt data, still able to do text search

Posted on September 10, 2016 by John Smith

If I use rot13 crypto I still can do text search.
For example:

Query: John
Encrypted Query: WBUA

Database Entries: John Smith => WBUA FZVGU
Jon Babe => WBA ONOR

Result: WBUA matches WBUA FZVGU

Are t… Continue reading Encrypt data, still able to do text search→

Posted in encryption

Mixing Off-The-Record and classic SSL

Posted on July 17, 2016 by John Smith

I am developing some pubsub system on top of Node.js and Socket.io. I decided to implement Off-The-Record (OTR) encryption by default for all of data transfers between clients and server(s). Question is do I need to additiona… Continue reading Mixing Off-The-Record and classic SSL→

Posted in certificates, encryption, off-the-record, TLS, websocket

CSRF-protection using authentication token in HTTP header?

Posted on January 27, 2015 by John Smith

I’m working on a web application which stores an authentication token in a cookie.

The only CSRF-protection is referrer checking.

I am considering improving this by moving the authentication token from cookies to a custom h… Continue reading CSRF-protection using authentication token in HTTP header?→

Posted in CSRF, web-application

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Anthropic Unveils Claude Security to Counter AI-Powered Exploit Surge April 30, 2026
  • AI Fuels ‘Industrial’ Cybercrime as Time-to-Exploit Shrinks to Hours April 30, 2026
  • The Human Element: DPRK IT Worker Fraud and Insider Risk April 30, 2026
  • 15-year-old arrested in massive French Government data leak April 30, 2026
  • Don’t Let Industry Jargon Cost You When Shopping for a Smart Bed April 30, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up