Daily Archives: April 5, 2025

Understanding Vulnerabilities and Exploits for Ethical Hackers

Understanding vulnerabilities and exploits is crucial for anyone interested in cybersecurity. Let’s learn what they are. What Are Vulnerabilities? A vulnerability is a flaw in software or hardware that attackers can exploit. These flaws can range from weak passwords to outdated software. For example, if you use default credentials when setting up a web server, […]

How to Use Wireshark Filters to Analyze Your Network Traffic

Wireshark is an open-source tool widely regarded as the gold standard for network packet analysis. It allows you to capture live network traffic or inspect pre-recorded capture files, breaking down the data into individual packets for detailed examination. You can use Wireshark in scenarios like troubleshooting network performance issues (for example, slow connections or dropped […]

The Cryptography Handbook: Exploring RSA PKCSv1.5, OAEP, and PSS

The RSA algorithm was introduced in 1978 in the seminal paper, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Over the decades, as RSA became integral to secure communications, various vulnerabilities and attacks have emerged, underscoring the importance of understanding and implementing RSA correctly. This handbook will help you understand the internal workings of […]