Didier Stevens

2024-09-24

Didier Stevens is a security researcher from Brussels, Belgium who has written many forensics-focused, open-sourced tools. ...

Read More

Kaiten malware

2024-09-24

Kaiten malware targets Linux hosts and uses IRC for its command and control protocol. Kaiten is often used to perform DDoS attacks. ...

Read More

disassembly

2024-09-23

Disassembly is a reverse engineering process where a binary is deconstructed–typically from compiled bytecode or binary data to source code ...

Read More

linter

2024-09-23

Linters are static analysis tools used to find bugs, errors, poor stylistic choices, and error-prone constructs within source code.

Read More

sending ssh packets at a flat rate to obscure keystroke timings

2024-09-13

A technique used to thwart SSH keystroke timing attacks is to send keystroke packets at a flat rate. Rather than immediately sending the packet, send ...

Read More

SSH keystroke timing attack

2024-09-13

A SSH keystroke timing attack occurs when an adversary is able to capture packets of ssh sessions, and measure the timing between keystrokes. Using ...

Read More

statistical learning

2024-09-13

Statistical learning is the process of learning based on the statistical structure of input.

Statistical learning has applications in language ...

Read More

Statistics

2024-09-13

Statistics is a Mathematical discipline that includes the collection, description, analysis, and inference of conclusions derived from quantitative ...

Read More

telnet, rlogin, ftp are insecure networking protcols, used broadly into the 00's

2024-09-13

When I began studying computer security in the mid 1990’s, encryption on network protocols was the exception, not the norm.

Many devices used ...

Read More

timinganalysisssh-song_wagner_tian2001

2024-09-11

Gaussian distribution
Read More