A new vulnerability has been discovered that makes it possible to get a privilegded process to core dump in a restricted area.
This can via a few nifty tricks be abused to gain root access to a linux system
Oct
A new vulnerability has been discovered that makes it possible to get a privilegded process to core dump in a restricted area.
This can via a few nifty tricks be abused to gain root access to a linux system
Sep
The cyber crime unit of the Danish police has put out a boot2root box to find relevant applicants for a job as web specialist.
I could not resit trying it out.
Jun
What happens if you put a funky format string as SSID for your wifi AP? For IPhones it can have an unexpected outcome.
Jun
Have you ever shared a picture of your Danish social security card (in Danish: sundhedskortet) online? Maybe with a finger across to cover the secret number?
Think you’re safe from identify theft? probably not!
Mar
I started the endeavour into the world of online hacking training/games back in December. Now, 100 days later, I will give a short update.
Jan
Have you ever pasted some random multi-line text to the bash shell ? If you have, then you will know how annoying this is. So here is the fix!
Dec
So I have been interested in computer security, hacking, cracking, preaking and everything around it since my early teenage years. It has mostly been for the fun of it and not something I would use for bad things. Back in the early days (mid-90es) security was just beginning to be a thing so defacing a […]
Sep
U2F/FIDO2 support is now officially available in OpenSSH.
Nov
Finally, you can use the your soloKey or other U2F key with openSSH. It is still very early support so you will have to do a bit of compiling yourself. Here’s how!
Oct
An fantastic interview with Edward Snowden for the Joe Rogan show. Almost 3 hours about the mass-surveillance going on in this world.