Improving web shells with asymmetric encryption

You're out surfing the world wide web having a great time, then suddenly, you find a security vuln...

FRA Challenge 2019-2

In this post we continue on the topic of FRA challenges. This challengemirror is quite different f...

FRA Challenge 2019-1

It's the end of the year and a nice time to look at the security challenges posed by our Swedish S...

The Internet shouldn't work

Greed is good, or is it? Cue the Vsauce intro. Have you ever thought, "How does the Internet w...

Backdooring RSA

You have probably heard about backdoors in different software, the dlink user-agent backdoor[1] ...

Self referential checksums

Checksums and hashes are great for detecting errors and modifications of data, but what if your data...

Reversing the reverser

Most apps on your phone can interact with the Internet. By analysing the details of these interactio...

Anonymous comments

Why is no one using anonymous comments anymore? Either you have to register for yet another site or ...

TS-Streams and Exercising

A few weeks ago my girlfriend showed me that the gym she goes to had started to upload instruct...

Optimal strategy for Fallout terminal hacking

Introduction If you've played the modern Fallout series you have without a doubt also tried to hack...