Jacob MooreThe Easiest Way to Breach a Company — External to Internal in 15 Tactics or LessAn explanation of a specific attack chain that that a majority of companies are vulnerable to.Apr 2Apr 2
Jacob MooreThe Dream of a Red King — A Connection Protocol for Small-World P2P BotnetsResearch focusing on creating a connection protocol for small-world botnets.Nov 20, 2023Nov 20, 2023
Jacob MooreSleeper Agents on the Wire — Network Interface Backdoors and the Challenges They Pose to DefensesHow the clandestine nature of Network Interface Backdoors pose peril to cybersecurity.Nov 14, 2023Nov 14, 2023
Jacob MooreExploiting Weak Pseudo-Random Number Generation in PHP’s rand and srand FunctionsAn in-depth study and elucidation of the cryptographic vulnerabilities in PHP 8.0’s rand and srand functions.Oct 18, 2023Oct 18, 2023