Post

Cryptography and Math. How Frequency Analysis capture shift number to Breaking Ciphers Caesar-like, with libraries Etao Pypi.

Immagine
  Cryptography and Math. How Frequency Analysis capture shift number to Breaking Ciphers Caesar-like, with libraries Etao Pypi. An example. #python #cryptography #cybersecurity #blockchain #ethicalhacking #hacking #penetrationtesting #penetration #tester

Encryption. Fermat's factorization and the quantum threat.

Encryption. Fermat's factorization and the quantum threat. Most of the most popular cryptographic systems are based on the fact that breaking keys requires the solution of an extremely complex mathematical problem, in which Fermat's Theorem on the factorization of prime numbers is used. The security of cryptographic systems, for the most part, lies in the fact that prime factorization is very complex. In practice, given a number with many digits, it is very difficult to determine its decomposition into these factors. However, in recent years, with the advent of quantum computers, we know that thanks to their remarkable computing capabilities, a cryptographic system could be breached in a relatively discrete time. Quantum computers work with complexity criteria divided into two Complexity Classes: P and NP. Class P provides that for a dimension 'N', there is a polynomial solution of 'N raised to P'. The NP class provides for a verification

Malware Analysis and IOC traces. In this example, use x64dbg program for reverse engineering and analysis of IOC,for processes in memory.

Immagine
  Malware Analysis and IOC traces. In this example, use x64dbg program for reverse engineering and analysis of IOC,for processes in memory. #malware #ethicalhacking #cybersecurity #ransomware #reverse #engineering

Oracle Database and how to test procedure in PL/SQL. An example.

Immagine
  Oracle Database and how to test procedure in PL/SQL. An example. #oracle #dba #database #query #plsql #stored #procedure

Cyber Security / Ethical Hacking. How to use nmap tool in "broadcast and discovery" modality. An example.

Immagine
Cyber Security / Ethical Hacking. How to use nmap tool in "broadcast and discovery" modality. An example. #ethicalhacking #cybersecurity #nmap #malware #network #hacking

Oracle - Database Tuning permissions on users, through PL/SQL and SQL Plus.

Immagine
  Oracle - Database Tuning permissions on users, through PL/SQL and SQL Plus. #oracle #dba #database #sql #plsql #administation

Linux Administration. How to search target in log Journal of Operating System.

Immagine
  Linux Administration. How to search target in log Journal of Operating System. #linux #administration #backend #aws #server #onpremise #journal #grep