Email workflow Sender ——HTTP/SMTP—-> HTTP/SMTP-Server —| SMTP Receiver —HTTP/IMAP/POP3–> HTTP/POP3/IMAP-Server
Continue readingCategory: Hacking & Security
Why using the TOR Browser for public APs?
The issue with public APs is that it can be used for MITM attacks, like sniffing network traffic. Workflow Normal
Continue readingCipher Suites
The ciper suite to be used between the client and the server gets negotiated during the SSL/TLS handshake. The client
Continue readingView certificates from NSSDB
List containing files $ ls cert9.db key4.db pkcs11.txt cert9.db SQLite database Certificate store key4.db SQLite database Password store pkcs11.txt Text
Continue readingCertificate status checking
A certificate has a specific expiary date and if it got untrusted by the CA in this time (e.g. its
Continue readingTLS-Handshake and CA
Prerequisites Server – Server certificate (it contains the server public key) – Server private key (to decrypt the pre-master secret)
Continue readingAuthentication – Session-based vs. Token-based
Session-based The client logs into the server and gets a session id. The server caches all sessions to be able
Continue readingPhishing (via Email)
Phishing comes in mind if you want access to another account, but you aren’t able to bypass the login (e.g.
Continue readingMalware comparison (Selection)
Fundamentals A Virus is a program which attaches itself to other programs. A Worm is a program which tries to
Continue readingShellcode injection via buffer overflow (x64)
Disclaimer – The application has to be vulnerable (e.g. gets, scanf, strcpy) for an overflow attack. – Modern compilers are
Continue reading