The Block Sec Distributed Systems and Security

0

LibSSH authentication bypass: CVE-2018-10933

Introduction So in this blog, we will be learning about the details regarding the LibSSH authentication bypass: CVE-2018-10933 along with a demo on how to exploit it. This Vulnerability was identified by Peter Winter and was released...

0

The Advantages of Blockchain Beyond Speculation

  The advantages of blockchain often become a secondary topic each time prices cycle through a new bubble. Public eyes shift away from the advantages of blockchain and towards the advantages of speculation. The good...

2

Hacking Windows Server using EternalBlue Exploit

Introduction EternalBlue is nothing but an exploit that was actually developed and used by the National Security Agency (NSA). But this was somehow leaked by the hacker group named the Shadow Brokers in April 2017...

0

Web Application Security Part – I

Introduction: There are so awesome web developers with new idea’s, new initiatives and startups. They sometimes fail what they claim. They claim that the security is in place and the files and have pretty...

0

Diving in Dapps and What is Ethereum

What is Ethereum? Ethereum is a peer-to-peer based platform on which decentralized applications can be built. Since its release in July 2015, Ethereum has risen to the top as the second largest cryptocurrency with...

0

Bitcoins and Wallets

Bitcoin Explained Bitcoin is a digital currency, created as a store of value for the anonymous exchange of goods and services online. It typically has all the properties of a more traditional currency and...

0

Road to Dell Security Acknowledgement Page

Hi folks, Last time in Proof of Concepts I wrote about how I found some Cross Site Scripting Vulnerabilities in a CMS which led to CVEs.So in this article, I’ll be sharing another POC...