-
How to Enable Browsing when You Have SSH Access
Introduction If you have access to SSH into a machine, it means you have full control of that machine. However if not all of the things can be done via terminal SSH, sometimes you need to browse some sites using that machine connection. The simplest solution for this is to create an SSH tunnel. SSH…
-
Prompt Attack: How to Leak System Prompt in GPT
What is a Prompt? In the context of natural language processing and machine learning, a prompt refers to the input given to a language model to generate a response. System prompt is the initial prompt that is provided to a language model by a computer program or system. It sets the context for the conversation…
-
ASUS Zephyrus G14 Display Brightness Flickering? Here’s How to Fix It
If you’re an ASUS Zephyrus G14 laptop owner, you may have experienced an issue with the display brightness flickering or adjusting automatically. This issue can be quite frustrating, especially when you’re trying to focus on your work or enjoy a movie or game. After some investigation, I found that the Radeon software “Vari-Bright” was the…
-
How to Install the Latest OpenWRT on Arduino Yun
By the time I am writing this, this might be the first article that tells you how to install OpenWRT on Arduino Yun because no one talks about it. Also, Arduino Yun is already reached its end of life, and the version history is not well documented in each article so I will write it…
-
How to Find and Connect to Hidden Wifi Network
Suppose you have a device that communicates using wifi, and you already know the password, but you can’t find the SSID name on your phone or computer. How can you connect? In this post, I will show you how to find and connect to the hidden network using Kali Linux. Prerequisites Getting SSID Name Make…
-
How to Install Alfa AWUS036NH Driver for Kali Linux
This wifi adapter is an important weapon for penetration testers due to its feature that supports monitor and packet injection mode on a 2.4Ghz network. However, even if Alfa said it is already supported out of the box in Kali Linux, I found it unstable out of the box. Sometimes it goes undetected. So here…
-
How to Do Buffer Overflow Attack on 64bit Machine
Professor’s course material was out of date. He made an example of a buffer overflow attack several years ago. Then here I am, asked to fix the code to work on a modern machine, 64bit Kali Linux. There should be no difference with other Linux; you can practice this on any 64bit Linux machine. Prerequisite…
-
This is The Most Expensive Thing That I Have Repaired
That day, Professor told me to start learning about power side-channel attacks. Our lab has some ChipWhisperer lite kits, and I took one. I took the course and learned how to do CPA and DPA with invasive methods, which we need to connect physically to the victim chip to measure the power trace. I did…
-
Problem When Building Old OpenSSL Version on The New System
The old OpenSSL seems to have a problem when built using a newer system. I got this problem when compiling OpenSSL 1.1.0f on my Ubuntu 22.04. For example in my case here the problem is in line 17 on Configure file and the line were like this: Some people tried changing the lines with qw/glob/…