Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …
Tag: tmack
Notes – AWS Systems Manager Session Manager
Session Manager is a fully managed AWS Systems Manager tool. With Session Manager, you can manage EC2 instances, edge devices, on-premises servers, and VMs. You can use either an interactive one-click browser-based shell or the AWS Command Line Interface. Session Manager provides secure node management without the need to open inbound ports, maintain bastion hosts, Read More …
TCP: The Backbone of Reliable Communication
The Transmission Control Protocol (TCP) is a fundamental part of internet communication, ensuring reliable data exchange between computers and systems. This article will go into some brief details on what TCP is, how it works, and its critical role in enabling seamless communication across networks. What is TCP? Transmission Control Protocol (TCP) is one of Read More …
Hacker Video – Exploiting Network Surveillance Cameras
Exploiting Network Surveillance Cameras Like a Hollywood Hacker
DHCP and Its Role in Network Functionality
The Dynamic Host Configuration Protocol (DHCP) is an essential component of modern networking, ensuring that devices can seamlessly connect and communicate within a network. This article explores what DHCP is, why it is critical for networks to function efficiently, and how to configure basic DHCP settings on a home router. What is DHCP? DHCP stands Read More …
Hacker Video – Analyzing Meterpreter with Redline
A victim VM has been deliberately infected with Meterpreter via an IE exploit. The video shows copying over a Redline collector to extract forensic artifacts and save them to network share. The artifacts are then imported to an analysis workstation over sftp and opened in Redline. The analysis starts at the highest malicious score to Read More …
CPU :: The Brain of Your Computer
If a computer were a human body, the Central Processing Unit, or CPU, would be its brain. The CPU is one of the most critical components in any computer, responsible for carrying out instructions and ensuring everything works together smoothly. Let’s explore what the CPU is, what it does, and how it functions in a Read More …
Hacker Video – Intro to Hacking Web Apps
Assessing the security posture of a web application is a common project for a penetration tester and a good skill for developers to know. In this talk, I’ll go over the different stages of a web application pen test, from start to finish. We’ll start with tools used during the discovery phase to utilize OSINT Read More …
RAM: The Heart of a Computer’s Memory
RAM, which stands for Random Access Memory, is a computer’s workspace—a temporary storage area where the computer processes and uses information. Let’s dive into what RAM is and why it’s essential for a computer to function. What is RAM? RAM, or Random Access Memory, is a type of computer memory that temporarily holds data and Read More …