Setup OpenWRT on Raspberry Pi 3 B+ to avoid data trackers

Posted on Fri 18 September 2020 in security, IT, open source

I am definitely not an expert in networking, so take all of this with some salt. Still, I found it valuable to have my home internet powered by open source software as much as possible, rather than some shitty closed black-box provided by my ISP.

There are already lots of …

Endless Christmas X-MAS CTF Writeup

Posted on Sat 22 December 2018 in binary reverse, IT, security

This is a writeup for the Endless Christmas challenge, md5 hash 866c92038d6e9fc47db4424f71f6167a (download binary). It appeared in the X-MAS CTF, and it's a Reverse challenge.

Using afl with Radare we can see there are calls to write and execve, both happening in main, a sign that this program creates (and …

The one time pad and the many time pad vulnerability

Posted on Thu 18 January 2018 in cryptography, IT, security

The scope of this article is to present the one time pad cipher method and its biggest vulnerability: the many time pad attack.

The one time pad: what it is and how it works

The one time pad is the archetype of the idea of stream cipher. It's very simple …