Category: Hacking

Password Insecurity – Part 3

And finally, here’s part 3:

Password Insecurity – Part 2

So here is the 2nd part of my series about password insecurity.

Password Insecurity – Part 1

Two years passed since I wrote an article here. There are so many other projects… Well, finally I’m writing articles for a security company where I’m actually employed as pentester. So here is the 1st one:

Monitoring Android Emulator Network Traffic

It might be interesting for several reasons to monitor the network traffic of Android devices to watch the network  behavior of some apps. This article describes how to monitor network traffic running the Android AVD Emulator on Linux.

Continue reading

GRUB Does Not Boot From SSD Disk

You have problems booting Linux from an SSD disk? You recycled an older notebook or you enhanced your newer notebook by replacing the old-school spinning harddrive with a new SSD drive and then… error: unknown filesystem. Entering rescue mode… grub rescue> You booted from an external drive and installed Linux to the SSD disk and …

Continue reading


Passing Arrays as Parameter in C

Short answer: you can’t but yes, you can! This is an endlessly recurring question in many groups on the Internet. Today (2016/01/14) Google has 171 Million hits. This article answers the question and sheds some light on arrays in C. In the second part below I’ll discuss two-dimensional arrays as well. IMO, arrays are the …

Continue reading

Fractals And Intel x86_64 Assembler

Some time ago I wrote this article about using integer operations to calculate fractal images. Currently, I’m giving a course which prepares for malware analysis. Among other things we deal a lot with Intel assembler and how compilers create and optimize code. The full code of everything discussed below (and also of the article referred …

Continue reading

Evading Firewalls With OnionCat

Evading Firewalls With OnionCat

The Administrator’s TLS Certificate Hell

Nowadays, a responsible administrator should never run any service without TLS anymore. Unfortunately, this makes life even more difficult for several reasons. This article discusses some problems associated to certificates, specifically in respect to web applications which interactively connect to secondary services. On one hand TLS configuration requires a lot of knowledge to create a …

Continue reading