EH-Net - Daw - Ease Me Into Cryptography Part 4: TLS

Ease Me Into Cryptography Part 4: TLS – Applied Cryptographic Foundations

You made it to part 4! Here’s a quick overview of what we have broken down so far. We started with some basic vocabulary for cryptographic building blocks and talked about hash ...
Hardware Hacking 101 - Lesson 2: Classical Hardware Hacking

Hardware Hacking 101 – Lesson 2: Classical Hardware Hacking

Welcome back to our ongoing series on hardware hacking and our second lesson. Last month we presented “Lesson 1: Beauty, Your Home Lab and Basic Electronics” with an appreciative nod to this ...
EH-Net - Daw - Ease Me Into Cryptography Part 3: Asymmetric Ciphers - Asymmetric Cyphers

Ease Me Into Cryptography Part 3: Asymmetric Ciphers

| | /root, cipher, Crypto, daw, highlight, python, Tutorial
Welcome to Part 3! A quick recap of where we’ve been. In Part 1: Buzzwords and Hash Function we talked about some foundational cryptography vocab and were introduced to hash functions, how ...
EH-Net - Sindermann - Hardware Hacking 101 - Lesson 1

Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics

Hardware hacking is one of those subjects that a lot of hackers appear to have great interest, but most don't act on that interest. There are a variety of reasons why this ...
EH-Net - Bango - From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt - Arnold!

From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt

While I’ve written a lot of code in my time, I don’t think I’ve ever firmly appreciated how complex it can be to write secure code. We go about our lives taking ...
EH-Net - Daw - Ease Me Into Cryptography Part 2: Symmetric Ciphers - Symmetric Cyphers

Ease Me Into Cryptography Part 2: Symmetric Ciphers

| | /root, cipher, Crypto, daw, highlight, python, Tutorial
In the first article in this series on the basics of crypto, "Ease Me Into Cryptography Part 1: Buzzwords and Hash Function", we learned some lingo and talked about the different aspects ...

A ‘How To’ for Asset Tagging

The systems in your environment are extremely important assets. Storing intellectual property, customer information, financial information, business automation, etc. If any of these systems are breached or become unavailable, there is a ...
EH-Net - Gates - WeirdAAL - Weird Al Raiders Pic

WeirdAAL (AWS Attack Library) Basics from the Authors

The cloud is everything. Organizations have either moved completely to the cloud, have a hybrid approach, or are actively planning a cloud strategy. Penetration testers have always had to provide their services ...
EH-Net - Kendall - Hacking Retro

Hacking Retro

Bring out your disco ball, your leg warmers, and your VHS tapes! While a lot of us watch the VH1 hit “I Love the 80s” for pop culture, I’m always drawn to ...

Windows Privilege Escalation – Unquoted Services

So, you’ve popped a user shell on a windows box and now you’re looking to escalate those privileges. Great! In this article we’ll look at one method of elevating your privileges by ...