Hi, I'm just reading up on Rowhammer, and I just want to put everything I already know down here.
Init.d root reverse Shell
I took the liberty to play around with Bash a bit. What came out of it, a small reverse TCP shell, which runs as init.d script. The idea was the following: "What if you already have root rights on a system? You don't want to create a new user, which also has root rights, because it might be noticed. So what do you do? Of course you create a backdoor, which runs with root rights. And that's exactly what it is.
Extract EXIF-Data from Images
Pictures and more pictures. We all like photos and pictures, but what if the pictures also contain more than you see at first glance? It should be known to everyone, but I'll just write a post about it anyway.
How QuickSort works
Quicksort is a sorting method according to the principle "divide and conquer" with an effort in best case in avg case and in worst case
OOP Strategy-Pattern usefull for IT-Sec?
The Strategy pattern is a design pattern from Object Oriented Programming. Why is this pattern actually very useful in IT security?
How MergeSort works
Mergesort is a sorting method to sort relatively fast huge amounts of data. Mergesort belongs to the divide & conquer algorithms with a big notation of
QuickTip - Run a HTTPServer on Specific location with python
Hi, since I have for some time Usbsticks etc to share files have not liked very much I was looking for other ways to provide files conveniently to friends or colleagues at work without the later someone arrives: "can you times, hasste already...".
NetCat - Portscanning TCP/UDP
NetCat as I mentioned in the previous post Post, that it is a Swiss army knife is not yet completely clear. Here I want to show that you can also make portscanns with NetCat no matter if TCP or UDP.
NetCat - Simple Bind-TCP Shell and Reverse-TCP Shell
Hi, I decided to write a bit about NetCat, specifically simple bind/reverse shell.
Netcat or nc is a real swiss army knife among network tools. With Netcat you can connect to many services like Telnet, RSH, HTTP etc... To that NetCat can do TCP/UDP. Netcat is very powerful, it is just because it is so powerful also used by hackers to create a backdoor or for bind and reverse shells.
Big Endian vs Little Endian
What is Big Endian and Little Endian. Here in this post I explain what it is and where the two differ.
Endian is nothing else than to say "what is the beginning and where is the end".