6 Articles

Log4j2 RCE and exploitation example (CVE-2021-44228)

Why this new Log4j vulnerability is so dangerous? Hacked step by step until remote shell.

Cryptography on Stanford

Completed this course online on Coursera, how was it?

Modifying a link after clicking

After clicking on something, it becomes something else. Schrödinger is awake.

Commonly used SQL injection attack strings

Collected my ~30 most used SQL injection query formats.

Public domain resolves to

Very little, but useful trick to avoid hostfile editing all the time.

Newest scam with prepaid phone cards

Story with a pinch of nonsense.