Hello 2019, Goodbye 2018!

Hello 2019, Goodbye 2018!

Before we get into it… Let’s start this off the right way.  Thank you readers, community contributors, and supporters! We say this every year and each year it means more to us than you will know.  As the Information Security community continues to grow, we...
Using LUKS

Using LUKS

Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption.  LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment.  LUKS can...
OverTheWire – Narnia 0

OverTheWire – Narnia 0

Introduction Source Code vs Executable Code Narnia Level 0 – Source Code Narnia Level 0 – Exploitation Narnia Level 0 – Solution Introduction This is an introduction to reverse engineering. I will be going through a series of reverse engineering...

You were not leaving your cart just like that, right?

Enter your details below to save your shopping cart for later. And, who knows, maybe we will even send you a sweet discount code :)