Cryptography December 2, 2020 Srinivas Credential Management Vulnerabilities Exploitation Case Study In the last few articles, we discussed how credentials are used in applications, how credential management can go wrong and how attacks like SQL Injection...
Cryptography December 1, 2020 Srinivas How To Exploit Credential Management Vulnerabilities In the previous article, we discussed some examples of poor credential management. Hardcoded credentials, improper error handling and insecure data storage...
Cryptography December 1, 2020 Srinivas Poor Credential Management As discussed in the previous article, use of credentials is one of the most common approaches used in applications and this is the de facto method that users...
Cryptography December 1, 2020 Srinivas How Is Cryptography Used In Applications? Cryptography is used in software to protect the data from adversaries. The key principles of cryptography is to provide confidentiality, integrity and authenticity...
Cryptography November 25, 2020 Howard Poston Decrypting Downloaded Files Malware authors commonly design their malware to communicate with their operators. In some cases, these command and control (C2) channels are designed to...
Cryptography November 24, 2020 Howard Poston Decrypting Malware Command and Control Network traffic analysis is a common approach to cyber defense. By performing deep packet inspection of all inbound and outbound traffic, an organization...
Cryptography November 23, 2020 Nitesh Malviya Introduction to Hash Functions Hash functions are most commonly used mathematical functions in cryptography for implementing security. A Hash function converts an input value of any arbitrary...
Cryptography November 23, 2020 Nitesh Malviya Introduction to Asymmetric Cryptography Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data...
Cryptography November 23, 2020 Nitesh Malviya The Advanced Encryption Standard (AES) Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data...
Cryptography November 23, 2020 Nitesh Malviya Fundamentals of Symmetric Cryptography Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data...