I am trying to understand the relationship between fingerprint of SSH server’s public key and known_hosts file.
There are two SSH servers with same public key. I, the client has the private key.
I login to the first SSH server,since it is … Continue reading SSH – What is the relationship between fingerprint and known_hosts file? →
Last week I penned a cheesy fake relationship breakup letter to Ubuntu, my Linux distribution of choice for the last 15 years or so. It had well and truly delivered
…read more Continue reading Bye Bye Ubuntu, Hello Manjaro. How Did We Get Here? →
If your business runs on Linux, this bundle provides essential knowledge.
The post Master Linux with 12 certified courses for $69.99 appeared first on TechRepublic.
Continue reading Master Linux with 12 certified courses for $69.99 →
The smart television is an interesting idea in theory. Rather than having the cable or satellite company control all of the content, a small computer is included in the television
…read more Continue reading RetroPie, Without the Pi →
I know that exploiting NULL dereferences is a thing of the past and that modern systems prohibit user processes from mapping NULL page, but I also know that back in the day, a NULL dereference in the kernel could be exploited from userland…
Continue reading NULL dereference – Why does it work? →
I know the string "03a34b99f22c790c4e36b2b3c2c35a36db06226e41c692fc82b8b56ac1c540c5bd" generates the SHA-256 hash 4c0b2d2f119a09b607cb273a745b2b0430d5192e0c4e536f932be5d1a6be5883 using https://privatekeys.pw/calc
However the comm… Continue reading Generating a SHA-256 hash from the Linux command line →
I am looking into the protection provided by IOMMU against DMA attacks.
I noticed that the Linux kernel provides a feature called bounce buffers for untrusted PCI devices (https://lwn.net/Articles/786558/) when the device drivers allocate … Continue reading How to check if a PCI device is trusted or untrusted by the Linux kernel (for IOMMU)? →
While there have been hiccups here and there, the general trend of electronics is to decrease in cost or increase in performance. This can be seen in fairly obvious ways
…read more Continue reading IR Camera Is Excellent Hacking Platform →
Posted in camera, digital cameras hacks, doom, imaging, linux, modifications, serial port, SoC, Thermal, webcam |
Tagged Lens, Temperature
On Linux (and maybe UNIX), you can access and even modify process’s stack with things like ptrace, process_vm_ready, etc., but is there a way to access the copy of the binary that’s being executed that is paged to memory? Not the executabl…
Continue reading accessing ELF in memory (Unix/Linux) →
Offensive Security has released Kali Linux 2023.2, the latest version of its popular penetration testing and digital forensics platform. New tools in Kali Linux 2023.2 Aside from updates for existing tools, a new Kali version usually comes with new too…
Continue reading Kali Linux 2023.2 released: New tools, a pre-built Hyper-V image, a new audio stack, and more! →