PGP and S/MIME
1. Core Principles of PGP (Pretty Good Privacy) The power of PGP comes from its hybrid encryption model, which intelligently combines two different encryption methods. Through its two powerful fea...
1. Core Principles of PGP (Pretty Good Privacy) The power of PGP comes from its hybrid encryption model, which intelligently combines two different encryption methods. Through its two powerful fea...
Certificate Generation: Using OpenSSL to Create CA, Client, and Server Certificates This post will walk you through the process of using OpenSSL to set up your own Certificate Authority (CA) and t...
The Concepts of Encoding and Decoding The first step in security analysis is to identify the format of the data you encounter. The most fundamental concepts here are encoding and decoding. ...
Everything About Digital Signatures and Certificates: A Complete Guide to PKI Today, we exchange vast amounts of information online. But how can we be sure that this data truly comes from a truste...
Hash and Encryption: Key Concepts and Differences In cybersecurity, hashing and encryption are essential techniques for data protection. While often confused, they have fundamental differences in ...
시작 OpenVPN을 설치합니다. 링크 로그인 후 오른쪽 CONNECT TO HTB를 클릭합니다. 그리고 그 아래 Starting Point 혹은자신이 실행시킬 머신을 클릭합니다. 새로 뜨는 창에 보이는 OpenVPN을 눌러줍니다. .ovpn 파일을 다운 받습니다. 다운 받은 ovpn파일을 OpenVPN을 열어 파일 섹션에 드...
URL Shortening Service Design Like TinyURL URL shortening can optimize links across multiple devices and track individual links to analyze potential customers and measure advertising campaign pe...
Waybackurls: Discovering Forgotten Paths for Reconnaissance Introduction to Waybackurls During the reconnaissance phase of a penetration test, gathering as much information as possible about a ta...
Shodan: The Search Engine for Everything on the Internet Introduction to Shodan Shodan is often called the “search engine for hackers,” but a more accurate description is a search engine for inte...
Passive DNS Analysis: Mapping Threat Infrastructure by Tracking Domain & IP History In cybersecurity investigations and threat intelligence, tracking an attacker’s digital footprint is critica...