So I’ve used Secure Socket Shell(SSH) in the past for school and work/intern projects. I have an understanding of how it works on a basic level, you connect to a machine over a network, and it should be secure but I got curious as to how it worked a bit on a deeper level. Today I want to give an overview on how SSH works, and some things I found interesting while reading about SSH.
Writing about random stuff, and things!
Just some of my written down thoughts.
Hello again to any acmFolks at https://acmcsuf.com/blog and anyone else reading! Today we’re gonna talk about another category of web-vulnerabilities called Remote code execution. The reason I’m writing about RCE is because after reading about it I found it fascinating how it can manifest itself in so many different, nuanced ways.
Recently I’ve been reading up on code-auditing. Here are some different tools that I read are effective in assisting code-auditing.
Coming from a background focused on software development, modern user management and system administration kinda shocked and left me mind blown since it’s something I never gave a lot of thought to. Thus far my experience with user management before my current role was maybe having an admin view, and just general application users.
I never really considered where applications load resources when executed and how this could be targeted for attack if they were loaded into the same address each time. So, when I read about ASLR I thought it was very cool and I want to give a quick high level overview on what I learned about ASLR.
https://acmcsuf.com/blog/845 Hello again my ACM folks, last time we broke down XSS on a higher abstract level (https://acmcsuf.com/blog/778). Today we’re gonna go over another pretty common web vulnerability called SQL injection (https://en.wikipedia.org/wiki/SQL_injection). This is another pretty common vulnerability to keep in mind when developing applications that make use of databases.
https://acmcsuf.com/blog/778 What is up my ACM folks, today we’re gonna break down and simplify Cross Site Scripting (XSS) on a higher abstract level. XSS is a pretty common web vulnerability so it’d be beneficial to know a bit about it when developing web applications.