Category: Uncategorized

  • The State of C2 Frameworks Today

    Introduction: Command and Control (C2) systems play a crucial role in Red Team operations, emergency response scenarios, and various other domains where effective coordination and stability is needed, Over the years, many command and control frameworks has been developed, You can find either open source or paid aka commercial options based on your preferences, The…

  • Explaining SMBv3 CVE-2020-0796 or SMBGhost

    Hello, today I’m going to explain the vulnerability on SMBv3 aka SMBGhost, for the time being Microsoft has released an urgent patch ” KB4551762 “, and for the record I wrote a small script to apply a workaround until the users update there systems “Click Here” , So how this vulnerability works? in the the…

  • Write up for the Parallel Vulnerability CVE-2020-7213

    Before Months started to get this annoying update popup for updating my Parallel Desktop and I kept cancelling the update by clicking “Remind me Later” but the last time I was free and I thought lets see what will happen If I clicked install now and check what will happen after. it wasn’t my intention…

  • Explaining DNS Over HTTPS DoH – Briefly

    Hi Guys, Long Time ago since I wrote here. but normally I like to talk about things I face problem with or feel like it will add value to the user. otherwise I’ll skip it and let the news or people in infosec talk about. anyway, today I have a really simple subject concept wise…

  • RC4 Algorithm

    This post is a special request from someone who is interested in this topic .. normally I don’t do easy  ciphers because there are many references on the internet, writing about it will be redundant .. anyway  today i’m going to briefly explain it hope that someone will get some benefit from it “finger crossed”…

  • Privacy or Stupidity

    Hello Guys .. I think we all (I mean people who are interested in Infosec) know what happened with WikiLeaks and Vault7 So I don’t have to tell you, otherwise for those of you who don’t know what happened long story short Wikileaks leaked CIA documents, methods and important files that is really classified .. so…

  • large key space in encryption schemes

    Hi Guys .. today I will try my best to explain why we need to use larger key space in our encryption schemes .. Okay so lets get something out of the way first .. key size is a factor among many others to make an encryption scheme secure .. so using large key size will…

  • Power of “Integrity” property in Cryptography

    Today’s post is about property in Cryptography called “Integrity” and It’s simply something that guarantee that what you send is what the intended  recipient received.. And you know what’s weird ? Most of the people now a days don’t think about this property anymore and this is shocking.. and this is not just the  normal…

  • Thoughts About PRNGs and some Attack Models

    For a while now I’ve been thinking about Randomness and uniform data sets , Believe it or not it’s a really fascinating subject but in the same time really complicated .. So In this post I’m going to talk about some models of attacking it.. So lets start ! I suggest that you read this article…

  • What is new In Crypto Ghost ?

    Hello People who care about privacy  !!! Finally I had time to update Crypto Ghost and Honestly I’m really happy with this update… And in this post I’m going to explain the latest development .. So what’s new ? First of All I added new Feature and that is “Removing Images Metadata”  So what is…