Category: Security

  • How to Enable Browsing when You Have SSH Access

    How to Enable Browsing when You Have SSH Access

    Introduction If you have access to SSH into a machine, it means you have full control of that machine. However if not all of the things can be done via terminal SSH, sometimes you need to browse some sites using that machine connection. The simplest solution for this is to create an SSH tunnel. SSH…

  • How to Find and Connect to Hidden Wifi Network

    How to Find and Connect to Hidden Wifi Network

    Suppose you have a device that communicates using wifi, and you already know the password, but you can’t find the SSID name on your phone or computer. How can you connect? In this post, I will show you how to find and connect to the hidden network using Kali Linux. Prerequisites Getting SSID Name Make…

  • How to Do Buffer Overflow Attack on 64bit Machine

    How to Do Buffer Overflow Attack on 64bit Machine

    Professor’s course material was out of date. He made an example of a buffer overflow attack several years ago. Then here I am, asked to fix the code to work on a modern machine, 64bit Kali Linux. There should be no difference with other Linux; you can practice this on any 64bit Linux machine. Prerequisite…

  • How to Enable HTTPS on Your Apache Ubuntu Web Server

    How to Enable HTTPS on Your Apache Ubuntu Web Server

    I thought this is an easy task, but after searching for various ways on the internet, it is not as simple as I imagined. There are many ways to enable HTPPS on your web server depending on what server software is used, the operating system, and where the server is running. In my case, I…

  • Now I Understand: What is Oblivious RAM?

    Now I Understand: What is Oblivious RAM?

    ORAM is the acronym of an Oblivious Random-Access Machine. The main idea is to hide the access patterns from attackers. For example, when a client tries to access data stored in the server, the server cannot gain any information about the user access pattern. Imagine data storage, where each data is inside a block, and…