Pinnedc0D3MLogJam Attack ExplainedTo understand DH key exchange, let’s first mathematic behind it.Oct 3, 2019Oct 3, 2019
Pinnedc0D3MLucky 13 Attack ExplainedThis attack is applicable with CBC mode of encryption and with MAC-then-Encrypt scheme.Oct 4, 2019Oct 4, 2019
c0D3MDNS Security — NSECIn the first part we discussed about DNSSEC and seen how DNS Record can be verified. It seems despite DNSSEC provides cryptographically…Dec 29, 2023Dec 29, 2023
c0D3MDNS Security — DNSSECThis is the second part of DNS Security series. In this post we will talk in detail about DNSSEC. Traditionally DNS doesn't support any…Dec 27, 2023Dec 27, 2023
c0D3MShortest Path Algorithms in GraphSome time you wanted to solve same problem with different technique thereby undertanding it much better. There are many path finding…Nov 17, 2023Nov 17, 2023
c0D3MLeetCode — 1970. Last Day Where You Can Still CrossThis is an interesting Hard problem and it can be solved in many different ways. In this port I am going to share few methods to solve it.Jul 15, 2023Jul 15, 2023
c0D3MHeartBleed Attack ExplainedTLS protocol has an extension HeartBeat and it is defined in RFC 6520. The main advantage of this extension is to keep the secure…Oct 3, 2019Oct 3, 2019
c0D3MPOODLE Attack ExplainedPOODLE stands for ( “Padding Oracle On Downgraded Legacy Encryption”). In this vulnerability, an attacker which is Man-in-the-Middle(MiTM)…Oct 2, 20191Oct 2, 20191