Can already opened event logs of PowerShell’s event properties screens on Windows be hacked by hackers in milliseconds?

I am wondering some issues about event log safety of powershell. I think is it possible to alter the powershell itself. But theorically the event log should show us every attempt made in powershell such as opening commands or codes that ma… Continue reading Can already opened event logs of PowerShell’s event properties screens on Windows be hacked by hackers in milliseconds?

Can already opened event logs of PowerShell’s event properties screens on Windows be hacked by hackers in milliseconds?

I am wondering some issues about event log safety of powershell. I think is it possible to alter the powershell itself. But theorically the event log should show us every attempt made in powershell such as opening commands or codes that ma… Continue reading Can already opened event logs of PowerShell’s event properties screens on Windows be hacked by hackers in milliseconds?

Is it possible to reverse engineer an encryption algorithm derived from AES-128 given these conditions?

Given the following conditions:

The encryption program, which uses some algorithm resembling AES-128 but with unknown modifications to real AES-128.
It uses a fixed key and IV.
It is written in Rust WITH debugging symbols but no source co… Continue reading Is it possible to reverse engineer an encryption algorithm derived from AES-128 given these conditions?