This website uses cookies for security purposes only. We do not track you or see your data.
Intro Recently I stumbled upon Paul dot com blog post Reverse Engineering Firmware Primer and decided to see if I…
Intro Recently I’ve decided to dedicate a fresh Debian environment for my RE tools and having binwalk seemed as a…
Intro This is the second post of a blog series following my progress with the “Practical Reverse Engineering: x86, x64,…
Intro This is the first post of what should be a blog series following my progress with the “Practical Reverse…
I have been thinking a lot about the fact that the panetesting, sourco code reviews and all those security assurance…
Couple of days ago a colleague of mine (thanks DL) got my attention with a lovely web server access log…
Couple of days I restarted my machine running Debian Wheezy and for my surprise I was not able to boot….
I’m writing this down for my own reference and if someone else benefits this I’ll be more than happy. Here…
HTTP Basic Authentication brief explanation HTTP supports several authentication mechanisms. Upon a request for resource within a protected space the…
Yesterday a partial dump containing email addresses and hashed passwords for the forum.arenabg.com members leaked. According to The Hackers News…