Forensics Tool to Detect Encrypted Files

Well shit, looks like I haven't posted in about two weeks. I really didn't mean to do that. This absence was entirely unplanned and served no real purpose. But here I am again, and I'll try to update on a semi-daily basis for the forseeable future. Oh, and it looks like I'm getting regular hits … Continue reading Forensics Tool to Detect Encrypted Files

Advertisements

Shared Memory Exploits

So last week I checked out Season 1 of Mr. Robot from the library. It's a series I've been meaning to watch for some time now, because some scenes I've seen suggest that it's really good inspirational hacker material, while other scenes suggest that it's just fodder for dumb normies who want to think they … Continue reading Shared Memory Exploits

Escaping from the Matrix with the Van Eck Tinfoil Hat

I spend a lot of time thinking about how to become invisible on the Internet. Because I'm not going to lie; I am one of those paranoid types who thinks the CIA is out to get me. Sometimes I believe it, sometimes I don't. I still have an inkling suspicion that my dentist embedded a … Continue reading Escaping from the Matrix with the Van Eck Tinfoil Hat

The Joy of Hacking

I've been on WordPress for exactly a month now, and so I thought it fitting to make a post that was a little more reflective in nature. I'm going to explore a subject I've thought extensively about... specifically I'd like to talk about what it means to hack, what it means to be a hacker, … Continue reading The Joy of Hacking

SSD Data Sanitation in Linux

Previously I talked about data sanitation on magnetic media (see my DoD tutorial). Now I want to explore the same topic, only with solid state drives. Data sanitation for SSDs is very different from data sanitation for HDDs - it is both easier and harder. Easier because there's no residual data left over - once … Continue reading SSD Data Sanitation in Linux

How to Block Websites and Prevent DNS Leaks Using Your hosts File

The hosts file is an entity that is present in every major operating system, including MacOS, Windows, and Linux. In Unix-based systems like Linux and MacOS its filepath is /etc/hosts. In Windows its filepath is C:\Windows\System32\drivers\etc\hosts. Although largely a relic of the past, this oft-ignored configuration file can be surprisingly useful even in the modern … Continue reading How to Block Websites and Prevent DNS Leaks Using Your hosts File

Understanding and Using the OpenSSL Command Line Utility

OpenSSL is an open source implementation of the SSL/TLS protocol, most commonly known as the security software underlying the majority of HTTPS servers on the Internet. What is less well-known is that OpenSSL comes with its own command line utility that lets you manually encrypt and decrypt files. I've found this utility most useful for … Continue reading Understanding and Using the OpenSSL Command Line Utility