security

What’s happening ‘inside’ encrypted Wifi networks?

Analyzing network connections with tools like Wireshark is usually straightforward if the traffic is accessible on a local interface. It’s...

Binary-level exploits — How to execute input data as machine code

Exploits can address any layer of an application. The most fundamental ones are those that target the binary level and...

Stack smashing prevention

Buffer overflows are common attack vectors that leverage missing checks of input data to overwrite program instructions. A rewarding program...

Cross-site scripting (XSS) demo

The following example demonstrates a cross-site scripting attack that manipulates a website to display the content of a stored cookie....

Step-by-step signature verification of X.509 certificates in Java

The Java code below demonstrates signature verification in a chain of X.509 certificates using cryptographic primitives (i.e. hash functions and ciphers)....

Encrypting web service demo in Java

The example below shows two simple crypto operations that are exposed via a web service interface. The approach is top-down,...