For my research I had a look at new functionalities of Android, especially related to security. I came across Protected Confirmation, which is a rather…
A blog about IT, security and whatever crosses my mind.
For my research I had a look at new functionalities of Android, especially related to security. I came across Protected Confirmation, which is a rather…
Last week I saw this tweet, which sparked a lot of interesting discussion about security of compilers.
I have been learning and practicing “hacking” for years now. In the last year, I conducted an experiment as part of my master’s thesis and…
WordPress is a rather popular publishing software, and as such, it is an attractive target for attackers. A lot of websites use it, lots of…
WordPress is a widely used software for websites, blogs and landing pages. The setup of WordPress is pretty easy and straight-forward even for non-technical users,…
For my thesis I researched a lot of resources regarding honeypots, including a number of open-source softwares. Before I clean up my bookmark bar and…
Playing around with privilege escalation techniques on my Linux box, I stumbled across an interesting exploitation method that can be used to get root privileges…
One of the most popular hacking requests, besides “how to hack facebook”, is how to gain access to protected WiFi networks. Many years ago, this…
I do not read books very often and when I do, I tend to do it in a day or two. In 2016 I read…
If you have ever forgotten a Wi-Fi password or you wanted to get network access in a electronics shop, I have a solution for you!