Asif Hameed KhanFree PCAPs for OT/ICS ProtocolsMany of us have been in a situation where we must validate our developed custom IDS rules/signatures (SNORT, Suricata, Zeek, etc.)…Jul 27, 2023Jul 27, 2023
Asif Hameed KhanDark Side of Social Media on Teenagers in IndiaRecently, the Internet is fumed by the group namely “Bois Locker Room” on social media platforms like Snapchat and Instagram. The group…Jul 8, 2020Jul 8, 2020
Asif Hameed KhanAutomated Malware Analysis Using ANYRUN SandboxANY.RUN is an automated malware analysis platform in which you can upload and execute any malicious file for analysis without any hassle.Jan 17, 2020Jan 17, 2020
Asif Hameed KhanFIPS 140–2 Cryptographic Module Validation Program (CMVP) (Chapter-3)It is better to refer to the Cryptographic Module Validation Program Management Manual [1] before jumping to the Cryptographic Module…Sep 13, 2018Sep 13, 2018
Asif Hameed KhanFIPS 140–2 How Cryptographic Module is Validated and Tested (Chapter 2)In FIPS 140–2 Introduction (Chapter-1) we presented the FIPS 140–2 as a standard for Cryptographic Module. Any Vendor’s product or software…Sep 7, 2018Sep 7, 2018
Asif Hameed KhanWhat is Cryptojacking? (Part 1)Cryptocurrencies like Bitcoin attained the attention of all the world in a previous couple of years followed by the scientific paper by…Aug 31, 2018Aug 31, 2018
Asif Hameed KhanEnabling FIPS 140–2 on Windows 10FIPS PUB 140–2 stands for Federal Information Processing Standards Publication (FIPS PUB) 140–2, which defines the set of cryptographic…Aug 30, 20181Aug 30, 20181
Asif Hameed KhanFIPS 140–2 Introduction (Chapter-1)FIPS PUB 140–2 (Federal Information Processing Standards Publication 140–2)[1] is a standard pertaining to the security of cryptographic…Aug 24, 2018Aug 24, 2018
Asif Hameed KhanVulnerabilities in Philips IntelliSpace Cardiovascular (ISCV) ProductsCyber attacks on healthcare domain is not new. With the advancement of devices, softwares and networks, new attack vectors are opening with…Aug 20, 2018Aug 20, 2018