Didier Stevens
2024-09-24
Didier Stevens is a security researcher from Brussels, Belgium who has written many forensics-focused, open-sourced tools. ...
Read More
Kaiten malware
2024-09-24
Kaiten malware targets Linux hosts and uses IRC for its command and control protocol. Kaiten is often used to perform DDoS attacks. ...
Read More
disassembly
2024-09-23
Disassembly is a reverse engineering process where a binary is deconstructed–typically from compiled bytecode or binary data to source code ...
Read More
linter
2024-09-23
Linters are static analysis tools used to find bugs, errors, poor stylistic choices, and error-prone constructs within source code.
Read More
sending ssh packets at a flat rate to obscure keystroke timings
2024-09-13
A technique used to thwart SSH keystroke timing attacks is to send keystroke packets at a flat rate. Rather than immediately sending the packet, send ...
Read More
SSH keystroke timing attack
2024-09-13
A SSH keystroke timing attack occurs when an adversary is able to capture packets of ssh sessions, and measure the timing between keystrokes. Using ...
Read More
statistical learning
2024-09-13
Statistical learning is the process of learning based on the statistical structure of input.
Statistical learning has applications in language ...
Read More
Statistics
2024-09-13
Statistics is a Mathematical discipline that includes the collection, description, analysis, and inference of conclusions derived from quantitative ...
Read More
telnet, rlogin, ftp are insecure networking protcols, used broadly into the 00's
2024-09-13
When I began studying computer security in the mid 1990’s, encryption on network protocols was the exception, not the norm.
Many devices used ...
Read More
timinganalysisssh-song_wagner_tian2001
2024-09-11
Read More
Gaussian distribution