Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Spectre and Meltdown- 3

Moritz Lipp    Reference →Posted 6 Years Ago
  • Essentially, computers got too fast and were sacrificing security for more speed. By predicting values in the cache, it leaves a side-channel leakage, which can lead to information being stolen (such as private keys).
  • This does not really affect your personal computer though. Code has to be running on the current machine in order to exploit this.
  • So, this affects cloud providers, such as AWS.
  • At this point, no in the wild exploitation has been found.

CA Hacker: DigiNotar and Comodo- 2

?    Reference →Posted 6 Years Ago
  • Essentially, this jackass hacked two CA (certificate authorities) and then bragged about it to the rest of the world.
  • He always made himself sound really superior, for some reason.
  • I picked this up from listening to a very old Security Now episode.
  • There are two CA hacks: DigiNotar and Comodo. Here are the links for the descriptions for those: Comodo chats and source code for itDigiNotar.

Deephack - SQL AI Database Hacking- 1

Bishop Fox: Dan 'AltF4' Petro & Ben Morris     Reference →Posted 6 Years Ago
  • This is an AI built to hack into SQL databases, which is really cool!