piratemoo
  • about
  • notes
  • space.cows
  • gitbook
  • contact

piratemoo

piratemoo

Notes: Intro to Crypto

Crypto 839: Intro to Notes C1-2

How do Alice/Bob communicate without Eve eavesdropping? Agree on a secret key Ke and have to do this through the same chan When Alice wants to send a msg: 1. Encrypts its using function E(Ke, m) then calls result of cipher text c 2. Alice sends ciphertext c=

By piratemoo
Crypto 839: Personal Notes C1

Notes: Intro to Crypto

Crypto 839: Personal Notes C1

> "A security system is only as strong as its weakest link" Attack Tree: Organizing a tree in a way to see/monitor weakest points. - Insight to possible lines of attack - Always part of a larger tree Weakest link property: Strengthening anything but weakest link can

By piratemoo
Rick & Morty THM Room

TryHackMe

Rick & Morty THM Room

Rick & Morty is a mini CTF room that ends up being the last challenge in the web hacking fundamentals section of TryHackMe, so I went ahead and captured the three flags for this challenge. First things first: I went to the webpage to take a look: Uh oh! Looks

By piratemoo
OWASP Top10 TryHackMe Notes

Cheat Sheet

OWASP Top10 TryHackMe Notes

OWASP, or the Open Web Application Security Project is a nonprofit foundation launched in 2001, that works to improve the security of software in an open community setting.  It was incorporated as a non-profit charity in April of 2004 and the goal is to enable organizations to maintain trusted applications

By piratemoo
Diana Initiative THM CTF

CTF

Diana Initiative THM CTF

This year, I got to not only volunteer at The Diana Initiative online conference, but I got to participate in the CTF in my spare time as well!  While I didn't get a chance to go through every challenge, here is a write-up of the flags and challenges

By piratemoo
Spectra on HTB Write-Up

Hack the Box

Spectra on HTB Write-Up

Spectra was a relatively easy box, so here's a brief write-up on what I did to root the machine.  I have a habit of checking pages before I run nmap so I visited the page first and found the following: Before I went any farther on the links

By piratemoo
A Little on Mobile Forensics

Mobile Forensics

A Little on Mobile Forensics

From the advent of the first portable phone, the DynaTAC 8000x (DYNamic Adaptic Total Area Coverage) and the first 20 minute call to the first car phone developed in 1984, to the release of the MicroTAC in 1989, we have been enthralled with phone communication and its ability to bring

By piratemoo
IOS Cheat Sheet

Cheat Sheet

IOS Cheat Sheet

By piratemoo
A Brief History of BT

Networking

A Brief History of BT

> With the re-emergence of popularity in both vendor and client Bluetooth usage, along with the release of BlueBorne, I thought I would write a post that provides readers with a little bit of a better understanding of the fundamental workings and flaws used with the technology.  This post was

By piratemoo
Curling With Hack The Box

Hack the Box

Curling With Hack The Box

With recent winter storms, seeing a machine titled after an ice sport peaked my interest, so I used it as an opener for my first write-up. Curling is a game where granite stones are slid across ice for score accumulation, and curlers try to find ideal paths, which is partly

By piratemoo
A Phone Story

Networking

A Phone Story

Many of us remember playing telephone and learning about attaching cans to a string and speaking through them as kids. That’s what’s known as the lover’s phone and was created sometime in the 16th century by a guy named Robert Hooke. The next 200 years or so

By piratemoo
Routing and Switching

Networking

Routing and Switching

In part 1 [https://www.piratemoo.com/introtonetworks/] of my recaps, I touched up on core foundations for CCNA 1, to clear up misconceptions new readers may face. This section however, is probably the harshest portion of material to digest, primarily because of the dense capacity combined with routing protocols

By piratemoo
See all
piratemoo
Powered by Ghost