
Cryptography
The Perils of Inadequate Key Size in Public Cryptosystems
A public-key cryptosystem is an asymmetric cryptosystem where the public key and the private key form a mathematically related key pair. The public key acts

General security
Lessons from Deficient Java Applet-based Authentication
Java Applets are bytecodes that are delivered via the browser, and executed using the Java Virtual Machine (JVM) at the client-side. Java Applets can access

Capture the flag (CTF)
The Pitfalls of Client-Side Authentication: Solutions to Net-Force JavaScript CTF challenges
Client-side authentication is when authentication checks are performed completely at users' side. The idea is that the authentication procedures, methods, or

Capture the flag (CTF)
Defeating Conundrums: Solutions to Net-Force Internet CTF Challenges
About Net-Force Internet Challenges These challenges require that you provide the correct passwords that are revealed to you after solving them. The challeng

Capture the flag (CTF)
Solutions to net-force cryptography CTF challenges
Cryptanalysis refers to the study of ciphers with the objective of breaking the code and obtaining plaintext (sensible) information. While older cryptosystem

Capture the flag (CTF)
Solutions to Net-Force steganography CTF challenges
Steganalysis refers to the process of locating concealed messages inside seemingly innocuous 'containers'. The idea behind steganography is embedding plainte

General security
Wi-Fi Security: Securing Yourself against Practical Wireless Attacks
While the access points in organizations are usually under the protection of organization-wide security policies, home routers are less likely to be appropri

Cryptography
TrueCrypt Security: Securing Yourself against Practical TrueCrypt Attacks
The need to defend confidentiality of our sensitive information against persistently rising cyber threats has turned most of us toward using encryption on a

Penetration testing
Antenna theory for wardriving and penetration testing
Wardriving is an activity in which a person seeks wireless access points in moving vehicles with high gain antennas mounted on the top. Usually, this access

Digital forensics
Forensics investigation of document exfiltration involving spear phishing: The M57 Jean case
Humans are often the weakest link in the security chain. In his book The Art of Deception, renowned hacker Kevin Mitnick explains how innate human tendencies

Digital forensics
Windows registry analysis with RegRipper – A ‘hands-on’ case study
Every analysis begins with specific goals in mind. As a forensics investigator, you are expected to know the type and importance of information you are looki