When it comes to Hollywood, hacking can sometimes look like magic. Rapid keystrokes, random characters racing across the screen, suddenly the firewall is hacked and the attacker has control over the systems. In reality, there…
A short summary of the best talks, highlights and my experiences of the 2nd day at the 36th Chaos Communication Congress (36C3).
A short summary of the best talks, highlights and my experiences of the 1st day at the 36th Chaos Communication Congress (36C3).
In my writeup for "Tr0ll 3" I will show how the VM fools us several times and explain how to achieve root permissions anyway.
In this tutorial we take a close look on how to recover the source code of an Android app in order to gain access to secret information.
The Heartbleed Bug is one of the most notorious software vulnerabilities of all time. Find out how it works and what its repercussions were.