In the previous article we saw how binary numbers are represented and how to convert from decimal to binary and vice versa, finally how to perform operations like addition, substraction, multiplication, division and bitwise operations between binary numbers. In this lesson we’ll talk about the hexadecimal system and why it is important for computer science in general. DEFINITION In mathematics …
Juniper ScreenOS backdoor: the attack demystified
Juniper Networks is a multinational corporation headquartered in Sunnyvale, California that develops and markets networking products. Its products include routers, switches, network management software, network security products and software-defined networking technology. On 18th December 2015 a critical vulnerability (CVE-2015-7755) affecting ScreenOS 6.3.0r17 through 6.3.0r20 was disclosed. The impact is huge because many routers and switches are powered by Juniper ScreenOS. …
Penetration testing course: 0x02 Prerequisites
I receive A LOT of private messages by people interested in “hacking”. 7 out of 10 are (sadly) people interested in learning how to hack a Facebook account, hack an email account, send spam through SMTP servers, find a good proxy for hiding their tracks while performing illegal activities (without having a clear concept of anonymity and privacy in mind) …