Shannon Entropy and Uncertainty of Information
Shannon entropy is commonly used in malware analysis, and I actually started writing this article after an attempt to better understand Shannon entropy after reading this paper by Duc-Ly Vu...
Image Processing Convolution Kernels
As someone who’s relatively inexperienced with image processing, I started by looking at random image kernels on the web before applying it on the Matlab environment while I’m testing some...
VulnHub unknowndevice64 Writeup
This is a writeup for VulnHub’s unknowndevice64: 1 challenge. It’s been a while since I last did a VulnHub challenge, so it’s a pretty good exercise. Service Discovery I started...
Getting Certified
Background I have a bit of interest in security, since I’m quite a paranoid regarding the data I own ever since my family bought a shared Windows XP PC to...
What Do Hackers Do?
Background One of my friends who’s not working in tech nor information security wanted to know about hackers, how attacking and defending are conducted in the cyber space, and how...