I recently established a wired connection into my server through my computer. I’ve mixed the protocols (OpenVPN, TOR, SOCKS) to RE-ANONIMIZE myself! I’ve put “The Good, The Bad and The Ugly” name on the scenario. Here is a very good picture of it!
Two weeks ago, SharifCTF was hold and the questions were acceptable. We attended with CGU team name and and gain the 44th place among the 682 attended teams, whom has at least one question solved in the CTF. In this post I described the writeup for the question about reverse engineering of Android app with 200 points (the 3rd question of reverse section).
As I told in About Mir Saman section, I love classical musics. I used to listen to online classical radios which are broadcasting the musics 24×7. I was wondering how these services are working. In this post I will show you how to create an online radio broadcast station from your computer. Continue reading Your Radio: Broadcast Yourself!
Last Wednesday, I have a small talk about SQLi web application vulnerability and how to prevent it. Here, I write about the tools and resources which can be used in learning the SQLi learning and prevention.
I have a workshop titled “Introduction to Cryptography and PGP” at Urmia University of Technology. I talked about basic concepts of signature and encryption using asymmetric cryptography. Then I talked about PGP which is one of the main usages of this system. I followed the workshop with configuring Thunderbird and GPG4win for applying PGP in Email system. You may find the contents in my previous post about GPG in Thunderbird and the way PGP works.
The pictures of this session is here.
In “Encrypting Emails using PGP/GPG”, I have described how to configure GPG (PGP) + Enigmail + Thunderbird for sending signed and encrypted emails. But the inner process of PGP is not described. In this post, I will describe how PGP works and the emulation process of PGP will be covered by the nice cryptography tool named cryptoolv2.
You may have visit SHODAN (The IoT search engine) or ZoomEye (World Wide Port Search Engine). The systems are very useful to have a good view of world! 🙂
But they have restriction for seeing results. For example SHODAN lets for unregistered users to view just 1 page (10 results). If you registered, the limitation is 5 pages. But again restriction!
So what to do?
In this tutorial I want to write about using Apache Spark on Ubuntu machines where you can develop big data analysis apps with it.
First of all, I want to write a small and quick introduction to Hadoop + Spark environment. Hadoop makes it possible to work with lots of computers in a cluster. Work can be: storing files in cluster (HDFS – Hadoop Distributed File System), storing database in cluster (Apache HBase), or run software in cluster (MapReduce, Spark).
PGP (Pretty Good Privacy) is a protocol for encryption and authentication of files and emails. In this tutorial I want to show how to create encrypted and signed emails using GPG (GnuPG), Thunderbird (Email Client), and Enigmail (Connector). I used windows as test case which the steps are same for *nix systems. Continue reading Encrypting Emails using PGP/GPG