Daniel A. BloomBinary Exploitation ELI5 — Part 3“To err is human… to really foul up requires the root password.”May 24, 20182May 24, 20182
Daniel A. BloomBinary Exploitation ELI5 — Part 2“ Wait a minute. Using an RX modulator, I might be able to conduct a mainframe cell direct and hack the uplink to the download.” —…May 2, 20181May 2, 20181
Daniel A. BloominHackerNoon.comBinary Exploitation ELI5– Part 10x00 — PrefaceApr 30, 2018Apr 30, 2018
Daniel A. BloomBOLO: Reverse Engineering — Part 2 (Advanced Programming Concepts)PrefaceApr 22, 20181Apr 22, 20181
Daniel A. BloominInfoSec Write-upsBOLO: Reverse Engineering — Part 1 (Basic Programming Concepts)Throughout the reverse engineering learning process I have found myself wanting a straightforward guide for what to look for when browsing…Apr 16, 20186Apr 16, 20186
Daniel A. BloomCovert Channels DemystifiedRecently as a result of the release of the Spectre and Meltdown vulnerabilities/attacks as well as the new X.509 based data exfiltration…Feb 6, 20181Feb 6, 20181
Daniel A. Bloom2018: The Year of the ThreatIn remarks given at the FBI International Conference on Cyber Security, FBI Director Christopher Wray cited Cryptocurrency, advanced…Jan 16, 2018Jan 16, 2018
Daniel A. BloomWPA3: What is it and what it means for youYesterday (1/8/2018), the Wi-Fi Alliance announced the newest Wi-Fi security protocol, WPA3. After last year’s KRACK Wi-Fi vulnerability —…Jan 10, 2018Jan 10, 2018
Daniel A. BloominHackerNoon.comExplain Spectre and Meltdown Like I’m 5Over the last couple of days, two major vulnerabilities — Spectre and Meltdown — have surfaced. These vulnerabilities, which affect nearly…Jan 8, 20181Jan 8, 20181