Demystifying RSA Encryption and Decryption with OpenSSL

In the realm of secure communication, RSA encryption plays a pivotal role, offering a robust solution through its public-key cryptography. This blog post aims to demystify the intricacies of RSA encryption and decryption, using the versatile OpenSSL tool. Overview of RSA RSA, named after its inventors Rivest, Shamir, and Adleman, relies on the mathematical properties of large prime numbers. It involves the generation of a public key for encryption and a corresponding private key for decryption....

December 6, 2023 · 3 min · 0xShakhawat

I hacked my First Machine

I’ve successfully rooted this machine. I won this machine. It’s my machine now. This is my first rooted machine. & I’m Awesome! #penetrationtesting #CyberSecurity #infosec #pentesting #Hacking I'll post with the procedure - "How I owned the machine".

July 29, 2023 · 1 min · 0xShakhawat

Vulnerability Assessment: A Complete Guide

As businesses continue to embrace digital transformation, the need for robust cybersecurity practices has never been greater. Vulnerability assessment (VA) is a critical component of any effective cybersecurity strategy, enabling organizations to identify, prioritize, and remediate security weaknesses before they can be exploited by malicious actors. In this guide, we’ll provide a comprehensive overview of vulnerability assessment, including what it is, why it matters, and how to conduct a successful assessment....

May 5, 2023 · 4 min · 0xShakhawat

Authentication :: Cybersecurity

When users have stated their identity, it is necessary to validate that they are the rightful owners of that identity. This process of verifying or proving the user’s identification is known as authentication. “Access control process validating that the identity being claimed by a user or entity is known to the system, by comparing one (single-factor or SFA) or more (multi-factor authentication or MFA) factors of identification” Simply put, authentication is a process to prove the identity of the requestor....

December 26, 2022 · 2 min · 0xShakhawat

Hack The MAC Address

MAC address is stands Media Access Control Address It ensures that the physical address of the Computer is unique. MAC spoofing is a technique for changing a factory-assigned Media Access Control (​MAC) address of a network interface on a networked device. It’s just like taking over someone else’s identity and performing action by impersonating them. MAC Spoofing plays a major role when it comes to network hacking. MAC spoofing helps you overtake the identity of some other device in the network and plays a major role in one of the most dangerous attacks called Man-in-the Middle....

February 3, 2022 · 6 min · 0xShakhawat