My project as Onion Harvester is accepted in OFFSECONF 2019. Onion Harvester is one of the projects I’m working on it partly. I give a brief presentation about working mechanism of TOR Network and talked about hidden services.
Continue reading Presenting Hidden Services in Onion HarvesterA Brief Introduction to BitCoin and BlockChain
I recently had a talk about BitCoin and mainly BlockChain technology at
Application of New Generation Technologies Session which was held on 7 Dec 2018 in Urmia.
P0SCon 2018
In this post, I’m going to write about the one day cyber-security conference which was held by Urmia University of Technology, named Protective and Operational Security (P0SCon).
Continue reading P0SCon 2018Miner Found!
I’m interested in movies and visit lots of movie sites. Recently I visited a site called YIFYTORRENTS in which I found a bitcoin miner in the site! In this post, I write about how I found the miner and how it acts.
Web Application Vulnerability: SQLi
Last Wednesday, I have a small talk about SQLi web application vulnerability and how to prevent it. Here, I write about the tools and resources which can be used in learning the SQLi learning and prevention.
“Introduction to Cryptography and PGP” Workshop
I have a workshop titled “Introduction to Cryptography and PGP” at Urmia University of Technology. I talked about basic concepts of signature and encryption using asymmetric cryptography. Then I talked about PGP which is one of the main usages of this system. I followed the workshop with configuring Thunderbird and GPG4win for applying PGP in Email system. You may find the contents in my previous post about GPG in Thunderbird and the way PGP works.
The pictures of this session is here.
Continue reading “Introduction to Cryptography and PGP” Workshop
Secure Programming Sessions – Urmia University CETR
In the next weeks, two sessions about web application vulnerabilities and Android Analysis and Code Injection will be held at Urmia University CERT.
You may register to the event through its registration link HERE.
Continue reading Secure Programming Sessions – Urmia University CETR
Smali Code Injection
In this post I wanted to demonstrate a simple code injection example in Android. As indicated in previous posts about reversing java, the method of code execution is same in Android. Whereas Java, the BYTE CODE are SMALI codes here and the executor is Dalvik (recently ART) in Android (not JVM). Here in this post, I will describe shortly how to reverse and inject code in SMALI.
Configuring LATEX for Xepersian and TexStudio
You may sometimes get bored with MS Word of (rarely) LibreOffice Writer. There is another document editor which is more likely to programming! LATEX!
In this tutorial I will show how to install LATEX in windows with TexStudio editor, step by step with pictures.