Posts
Unboxing RFIDIOt's Black Cow Deluxe Cheddar Cheese
As I write this blog, during this historical moment, when almost the entire world is under home quarantine amidst the fear of deadly COVID-19 virus, it gives me immense pleasure to tell you I, finally, unboxed one of the two Black Cow Deluxe Cheddar cheese blocks that I won (on two consecutive days) during the Practical RFID / NFC Hacking training by Adam Laurie at Nullcon Goa 2020, just three weeks ago.
Posts
Wordpress in Docker: What caused the incorrect port forwarding
Did you ever come across a scenario when you wanted to get something done desperately, but, you felt like being on the verge of giving up, however, you never really gave up?
Since last night, I had been going crazy trying to access my local installation of WordPress site from my Android device, but after umpteenth effort, all I landed on was either an error page or an empty page.
Posts
How I solved the Unlockme APK Challenge at c0c0n XII (Dome CTF)
“Is there a challenge that I can solve?”, I asked. My teammates must have felt interrupted because everyone was too busy solving different puzzles that were part of the ongoing Dome CTF competition at c0c0n XII. After waiting for a while, I heard Bharath say, “There’s an Android challenge, Riddhi! Would you like to solve it?”. I was delighted to hear what I heard. Without giving any second thoughts, I said, “Yes!
Posts
Automated Session Handling Using Burp Suite Macros
The Problem Statement There are things which could be delegated to tools and there are things that heavily depend on the usage of human brain. Then, why waste your brain on a no-brainer? For example, imagine the time and effort spent by quality engineers in a trivial task like entering valid login credentials and switching between user accounts. Let’s admit! It’s monotonous and an energy draining unavoidable task that needs to be taken care of during every single security assessment.
Posts
Cryptanalysis
All about common security weaknesses and attacks.
What? Cryptography refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services. It is required in order to protect the confidentiality and integrity of sensitive user data. Cryptographic systems aim to provide one or more of the following services:
Authentication
Using cryptography, it is possible to identify a remote user (or system), e.g., via SSL certificates.