Shannon Entropy and Uncertainty of Information

Shannon entropy is commonly used in malware analysis, and I actually started writing this article after an attempt to better understand Shannon entropy after reading this paper by Duc-Ly Vu...

Image Processing Convolution Kernels

As someone who’s relatively inexperienced with image processing, I started by looking at random image kernels on the web before applying it on the Matlab environment while I’m testing some...

VulnHub unknowndevice64 Writeup

This is a writeup for VulnHub’s unknowndevice64: 1 challenge. It’s been a while since I last did a VulnHub challenge, so it’s a pretty good exercise. Service Discovery I started...

Getting Certified

Background I have a bit of interest in security, since I’m quite a paranoid regarding the data I own ever since my family bought a shared Windows XP PC to...

What Do Hackers Do?

Background One of my friends who’s not working in tech nor information security wanted to know about hackers, how attacking and defending are conducted in the cyber space, and how...