Passwords – Cracking Hashes

Password Safeguards Password Strength Password strength or complexity is the goal of having a good password and making it strong against brute-force attacks. ab where a is the possible symbols and b is the length. If you have a 4 letter password containing only [0-9]...
Using LUKS

Using LUKS

Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption.  LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment.  LUKS can...
OverTheWire – Narnia 0

OverTheWire – Narnia 0

Introduction Source Code vs Executable Code Narnia Level 0 – Source Code Narnia Level 0 – Exploitation Narnia Level 0 – Solution Introduction This is an introduction to reverse engineering. I will be going through a series of reverse engineering...
Malware Types

Malware Types

Malware Types Malware can be classified by it’s behavior, target platform, or attack commands.  Of the three classifications, we will look more specifically at malware based on behavior.  These can be divided into 8 different categories: I. Infectors II. Network...

You were not leaving your cart just like that, right?

Enter your details below to save your shopping cart for later. And, who knows, maybe we will even send you a sweet discount code :)