Skip to content

Max's Blog

  • Home
  • About
Max's Blog

Category: Hacking & Security

February 16, 2024 max-sperling

Email encryption

Email workflow Sender ——HTTP/SMTP—-> HTTP/SMTP-Server —| SMTP Receiver —HTTP/IMAP/POP3–> HTTP/POP3/IMAP-Server

Continue reading
October 25, 2023 max-sperling

Why using the TOR Browser for public APs?

The issue with public APs is that it can be used for MITM attacks, like sniffing network traffic. Workflow Normal

Continue reading
May 4, 2021 max-sperling

Cipher Suites

The ciper suite to be used between the client and the server gets negotiated during the SSL/TLS handshake. The client

Continue reading
March 11, 2021 max-sperling

View certificates from NSSDB

List containing files $ ls cert9.db key4.db pkcs11.txt cert9.db SQLite database Certificate store key4.db SQLite database Password store pkcs11.txt Text

Continue reading
March 10, 2021 max-sperling

Certificate status checking

A certificate has a specific expiary date and if it got untrusted by the CA in this time (e.g. its

Continue reading
January 18, 2021 max-sperling

TLS-Handshake and CA

Prerequisites Server – Server certificate (it contains the server public key) – Server private key (to decrypt the pre-master secret)

Continue reading
October 7, 2020 max-sperling

Authentication – Session-based vs. Token-based

Session-based The client logs into the server and gets a session id. The server caches all sessions to be able

Continue reading
January 7, 2020 max-sperling

Phishing (via Email)

Phishing comes in mind if you want access to another account, but you aren’t able to bypass the login (e.g.

Continue reading
January 7, 2020 max-sperling

Malware comparison (Selection)

Fundamentals A Virus is a program which attaches itself to other programs. A Worm is a program which tries to

Continue reading
November 23, 2019 max-sperling

Shellcode injection via buffer overflow (x64)

Disclaimer – The application has to be vulnerable (e.g. gets, scanf, strcpy) for an overflow attack. – Modern compilers are

Continue reading

Posts navigation

1 2 Next Posts»

Categories

  • Other (17)
    • Games (11)
    • Nutrition (4)
    • Traveling (2)
  • Science (17)
    • Chemistry (3)
    • Linguistics (2)
    • Math (10)
    • Physics (2)
  • Sport (71)
    • Climbing (5)
    • Diving (20)
    • Fitness (7)
    • Martial arts (33)
      • Ground fighting (9)
      • Mixed martial arts (4)
      • Stand-up fighting (11)
    • Running (1)
    • Surfing (2)
    • Swimming (1)
    • Volleyball (2)
  • Technology (268)
    • Computer (238)
      • Architecture & Design (15)
      • Artificial intelligence (3)
      • Audio & Video (11)
      • Building & Reversing (15)
        • CMake (2)
      • Computational complexity (3)
      • Computer architecture (5)
      • Debugging & Memory (26)
      • Development (58)
        • CI/CD (1)
        • Programming (48)
          • Concurrency (5)
          • Data structures (12)
          • Pointers & References (7)
        • Scripting (3)
        • Testing (6)
      • Development process (5)
      • Hacking & Security (17)
      • Hardware & Protocols (8)
      • Networking (11)
      • Operating system (18)
        • Linux (11)
        • Windows (7)
      • Regular expression (2)
      • Tool configuration (5)
      • Version control (22)
      • Virtualization (7)
      • Web (27)
    • Electrics (9)
    • Mechanics (15)
    • Medicine (2)
    • Photography (4)
WordPress Theme: Wellington by ThemeZee.