David BruckerComplex Password vs. Buffer Overflow? And the winner is…A Proof-of-Concept of a Buffer Overflow vulnerability to bypass a password prompt.Sep 28, 20231Sep 28, 20231
David BruckerWeak Spot IP Camera — From Shodan To Full RCEBet you have no idea how easy it is to hack an Internet CameraMar 2, 2023Mar 2, 2023
David BruckerCreate your own Darknet website to protect your organization from Tor trafficBy having your own darknet website you will be able to decide whether you should protect your organization from any Tor traffic or not. In…Apr 13, 2022Apr 13, 2022
David BruckerWhy Did I Encrypt Myself With My Own Darknet Ransomware?I intentionally encrypted all data on my computer and sent the decryption key to the TOR network, aka the “Darknet”. After clarifying how…Mar 25, 20221Mar 25, 20221