Siz Zin

845 Flips | 4 Magazines | 53 Likes | 2 Following | 252 Followers | @SizZin | Security and Linux

Award-winning security research reveals a host of never-seen, currently unblockable web-tracking techniques

Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies won the Distinguished Paper prize at this year's Usenix …

Information Security

Foreshadow: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution

Introduction<p>Foreshadow is a speculative execution attack on Intel processors which allows an attacker to steal sensitive information stored inside …

Information Security

What Does Immersing Yourself in a Book Do To Your Brain?

Only connect.<i>–E.M. Forster</i>The act of taking on the perspective and feelings of others is one of the most profound, insufficiently heralded …

Literature

You could have invented that Bluetooth attack

A serious bluetooth bug has received quite a bit of attention lately. It’s a great find by Biham and Newman. Given BLE’s popularity in the …

Mathematics

This life skill is more vital to your happiness than any other

Here’s a harsh life truth that you’ll never hear in your formative years — there is a very high probability you will not discover what you truly want …

Motivation

Legal Sites to Practice Hacking Skills

Like they say; “practice makes perfect”. After completing a bunch of hacking and pentesting tutorials, the next step should be to practice your …

Web Applications

project:rosenbridge

: hardware backdoors in x86 CPUs<p>github.com/xoreaxeaxeax/rosenbridge // domas // @xoreaxeaxeax<p>Overview<p>project:rosenbridge reveals a hardware backdoor …

Cybersecurity

Hacker Finds Hidden 'God Mode' on Old x86 CPUs

Old VIA C3 chipsets have an undocumented RISC coprocessor that gives you root access from userland if you simply type in four bytes.

Information Security

UNIX Syscalls

Overview<p>On UNIX-like operating systems, userland processes invoke kernel procedures using the “syscall” feature. Each syscall is identified by a …

Linux

The Beginning of the End of WPA-2 — Cracking WPA-2 Just Got a Whole Lot Easier

Here is me cracking WPA-2 using the four way handshake:<p>For this I needed to capture the communication of the 4-way handshake, and then crack a …

Information Security

The Easy Road to Remarkable Mental Toughness

These 3 easy but powerful strategies will help you achieve your maximum mental toughness.<p>"I wasn't there to compete. I was there to win." -- Arnold Schwarzenegger<p>You can spend time in the gym lifting weights to get physically stronger, but how much time are you spending to create a mind that is …

Self-improvement

Tracking multiple objects with OpenCV

By onAugust 6, 2018 in Object Tracking, Tutorials<p>Inside today’s tutorial, you will learn how to track multiple objects using OpenCV and Python.<p>This …

Python Programming

Copyright ©2008, ©2009, ©2010, ©2011, ©2012, ©2013, ©2015 by Robert G. Plantz. All rights reserved.<p>The author has used his best efforts in preparing …

Writing

How To: Exploit Shellshock on a Web Server Using Metasploit

One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via …

Cybersecurity

How does JPEG actually work?

JPEG is an image encoding designed to compress photographs and<br>similar images effectively, often 5 to 15 times over a raw bitmap<br>format. It's a lossy …

awesome-windows-kernel-security-development

❤️<p>windows kernel driver with c++ …

Forensics

Regular Expression Matching in the Wild

The split gives higher priority to the path leaving out the top. A non-greedy repetition is just a greedy repetition with the priorities reversed.<p>To …

Programming

Regular Expression Matching: the Virtual Machine Approach

R. McNaughton and H. Yamada and Ken Thompson are commonly credited with giving the first constructions to convert regular expressions into NFAs, even …

Compilers

Positive Technologies - learn and secure

Intel patches new ME vulnerabilities<p>In early July, Intel issued security advisories SA-00112 and SA-00118 regarding fixes for vulnerabilities in …

Information Security

OALabs Malware Analysis Virtual Machine

liners

Measuring the Horizontal Attack Profile of Nabla Containers | James Bottomley's random Pages

One of the biggest problems with the current debate about Container vs Hypervisor security is that no-one has actually developed a way of measuring …

Kernel index

This index covers articles published in the LWN.net Kernel Page. All articles from the beginning of 2004 have been entered here.<p>Rich access control …

What if we want to call an assembly function and pause after returning from it?<p>Lets write a Python function func_call(func_addr) for that. (Run this …

A broad overview of how modern Linux systems boot

For reasons beyond the scope of this entry, today I feel like writing down a broad and simplified overview of how modern Linux systems boot. Due to …

Learning Bluetooth Hackery with BLE CTF

Do you want to get into tinkering and hacking Bluetooth LE devices? Up until now, doing so was very much a DIY process. You would have to find …

Hacking macOS: How to Use One Python Command to Bypass Antivirus Software in 5 Seconds

The misconception that macOS is more secure than the Windows operating system is far from the truth. With just one small command, a hacker can …

JVM Internals

This article explains the internal architecture of the Java Virtual Machine (JVM). The following diagram show the key internal components of a …

Learning operating system development using Linux kernel and Raspberry Pi

This repository contains a step-by-step guide that teaches how to create a simple operating system (OS) kernel from scratch. I call this OS Raspberry …