3 Line RSA in perl
The following 3 line implementation of RSA in perl is pretty cool: #!/bin/perl -sp0777i<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<j]dsj $/=unpack('H*',$_);$_=`echo 16dio\U$k"SK$/SM$n\EsN0p[lN*1...
View ArticleXML Security: A Billion Laughs
The Billion Laughs Attack The Billion Laughs attack is a denial-of-service attack that targets XML parsers. The Billion Laughs attack is also known as an XML bomb, or more esoterically, the...
View ArticleAnarctica Has No Internet!
Apparently, there are no networks in Antarctica. However, it appears as though ISO codes have been assigned, for when the networks come. # Country: Antartica # Total Networks: 0 # Total Subnets: 0 #...
View ArticleAfrican Networks
Here is a list of all of the networks in Africa, broken down by country and subnet. # Country: Africa # Total Networks: 1,537 # Total Subnets: 24,124,672 # Country: ALGERIA # ISO Code: DZ # Total...
View ArticleSaint Lucia – 8-bit Internet
Saint Lucia – The country with the 8-bit subnet, and 256 IPs to show. # Country: SAINT LUCIA # ISO Code: LC # Total Networks: 1 # Total Subnets: 256 205.166.35.0/24
View ArticleUnzip in Ubuntu
My Ubuntu distribution came with the unzip program installed, but if yours did not, you can install unzip with: $ sudo apt-get install unzip After installation, its as simple as: $ unzip [zipfile]
View ArticleThe XML Signature: Syntax and Usage
The W3C XML Signature defines XML syntax for demonstrating the authenticity of a digital message or document. If a digital signature is deemed to be a valid signature, it is highly likely that the...
View ArticlePEM: Privacy Enhanced Mail
Privacy Enhanced Mail (Privacy-enhanced Electronic-Mail) is a proposed IETF standard for securing electronic mail using public-key cryptography. The .pem file extension is used to signify a...
View ArticleVim: Converting tabs to spaces
On machines running linux you can create a file named .vimrc in your home directory. This file will be parsed for configuration parameters when you open vim. To edit this file, or create it if it...
View ArticleHacking Master Dial Combination Locks
I am by no means the first person to use this technique to hack the Master Dial Combination Lock. That aside, hacking combo locks is fun. Its kind of like solving a Rubik’s cube, except that I can’t...
View Article