>/Home $


Web Terminal v1.0

Skip

  • Show/Hide
  • Maximize
  • Close

Recent posts

1337up Live 2024 Phish Market Order Management

### First Part **Look at the files** ``` │>PHISH_MARKET │ docker-compose.yml │ start.sh │ ├───market │ Dockerfile │ market │ wait-for-it.sh │ └───mysql Dockerfile init-db.sql ``` As you may have noticed, there are 2 Docker containers: one with a MySQL database and another one contai

Kpmg2024 Mobile App Reverse

### First Part Well, since the description was rather brief, we can't learn much from it. Therefore, it's a good practice to start examining the application by running the command: ``` strings program.ext ``` in Linux to see what ASCII strings are stored in the application. On Windows, there are desktop applications for performing a si

Learn With Me - Public-key Cryptography

## The Discrete Logarithm Problem Now that you understand modular arithmetic, we can move on to its applications. In the previous post, we discussed how to perform modular computations. Now, it's time to learn how these computations are used in cryptography. Calculating the remainder in an equation like this might be easy: $$ 5^{13}\bmod{17} =