Sign in

Cybersecurity Student. Researcher Wannabe.

How to create your own CSR for SSL implementation.

image src: https://cdn2.iconfinder.com/data/icons/web-files-essential/48/v-24-512.png

What is a CSR?

A certificate signing request (CSR) is the initial step to implement SSL/TLS on your server. The CSR is generated in the target server itself and contains important information about your server like — domain, country, owner details and general contact details…


Dynamically unpacking UPX payload from memory.

What is UPX?

Ultimate Packer for eXecutables (UPX) is a free and opensource executable packer.

This usually is short for “runtime packers” which are also known as “self-extracting archives”. Software that unpacks itself in memory when the “packed file” is executed. Sometimes this technique is also called…


Use one CLI application for multiple CL entry points.

Our Goal

To create symbolic links which will execute different code section but will point to same program.

Background Theory

What is a symlink?

A symlink (symbolic link) is essentially a pointer to a file or folder located elsewhere, consumes little space and is very fast to create (compared…


Add and remove modules from the Linux Kernel for digital privacy.

What is modprobe you ask?

modprobe intelligently adds or removes a module from the Linux kernel. modprobe looks in the module directory /lib/modules/`uname -r` for all the modules and other files, except for the optional configuration files in the /etc/modprobe.d directory.

~(man)ual pages

Kernel and Kernel Modules in Linux

In…


A blast to past to see what it took to be secure 25 years ago!

Disclaimer

Microsoft Windows95 is the registered property of Microsoft Corporation® and released for general use on August 24, 1995. …


Set up your own prebuilt-Windows10 based malware analysis lab in Hyper-V

Creating your own malware analysis lab can be time consuming and hectic, to setup all the tools required might take 2–3 days if not a whole week for a beginner.

It took me 2 weeks to develop a stable…


Practical Understanding of Public-Key based Encryption Strategies and their Efficiency.

But then why do PGP / GPG and other encryption tools have "encrypt with RSA" option?

And, what’s even the use of this if we can’t use it to encrypt large files?

Are you saying RSA is useless? …


Utilizing PGP Keys to Encrypt Everything you have.

If have some super private or confidential data on your computer and don’t want anyone to have it, even if they have login access of your computer, then you already know the answer to “Why should we do this”.

Now all that…


A DETAILED GUIDE ON BRAINF*CK FOR BEGINNERS AND ENTHUSIASTS

WTF?

Brainfuck is the most famous esoteric programming language, and has inspired the creation of a host of other languages. Due to the fact that the last half of its name is often considered one of the most offensive words in…


Write-up for Samsung SCTF’s Android Reverse Engineering Challenge : Vault 101 using pure static analysis based reverse engineering.

Saket Upadhyay

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store