infosec

infosec

Exfiltrating Past CSP Directives

An example of using Google Analytics to exfiltrate past CSP directives on HackerOne

Read
infosec

Revoking a PGP Key from MIT's Key Server

Instructions on how to revoke your public PGP key from MIT's Key Server.

Read
infosec

Temporarily "Fixing" Shadow Tech's SSL/TLS Issues

It's Sunday and I wanted to play some computer games to relax before the next work week. I'm a quite happy customer of Shadow, which is a gaming VM in the cloud that I've been using for the past months. Basically it's a windows VM with very good gaming hardware that you rent access to. However this Sunday I was faced with an issue. So I tried and successfully managed to hack my way around it.

Read
infosec

Veracrypt Cheatsheet

Short cheatsheet for using Veracrypt

Read
infosec

Stored XSS via Swish Transaction

Last week I went to the cinema with some friends. My friend paid for the ticket so I decided to use

Read
infosec

Revisiting the Free Wifi on Destination Gotland

I'm on the boat from Gotland again after having spent a week there with my

Read
infosec

SSLStrip

Continuing with the theme of wifi attacks, tonight I'm looking at the SSLStrip tool.

Read