Skip Navigation
How Target Was Breached in 2013
blog.0x7d0.dev How Target Was Breached in 2013

These days, phishing is a widely discussed topic, especially during October, which is Cybersecurity Awareness Month. There are plenty of examples of companies being hacked using this technique, and the breach of 40 million credit card numbers at Target, for instance, started with a phishing attack.

How Target Was Breached in 2013
0
How Equifax Was Breached in 2017
blog.0x7d0.dev How Equifax Was Breached in 2017

On a Saturday night, a security engineer at Equifax was updating an SSL certificate on a Network Intrusion Detection System (NIDS). Immediately after, suspicious connections were detected. After a more in-depth investigation, it became evident that the situation was far graver than anticipated. A se...

How Equifax Was Breached in 2017
1
How AES Is Implemented
blog.0x7d0.dev How AES Is Implemented

The AES algorithm is widely used today, whether it’s for encrypting a connection to a website, encrypting data on your hard drive, or storing passwords in your favorite password manager. It has been battle-tested for many decades and is still recommended as one of the most secure algorithms. In this...

How AES Is Implemented

In this article, I explain how AES encryption works and how the algorithm is implemented.

4
Unlocking Discord Nitro Features for Free
blog.0x7d0.dev Unlocking Discord Nitro Features for Free

There are several modded Discord clients available that allow you to tweak the appearance or add certain features. However, some plugins can even unlock certain functionalities that require a paid subscription to Discord Nitro. How is this possible?

Unlocking Discord Nitro Features for Free
0
How They Bypass YouTube Video Download Throttling
blog.0x7d0.dev How They Bypass YouTube Video Download Throttling

Have you ever tried to download videos from YouTube? I mean manually without relying on software like youtube-dl, yt-dlp or one of “these” websites. It’s much more complicated than you might think.

How They Bypass YouTube Video Download Throttling
0
How the Nintendo Wii Security Was Bypassed
  • It was quite nostalgic to do the research while writing this article!

  • How the Nintendo Wii Security Was Bypassed
    blog.0x7d0.dev How the Nintendo Wii Security Was Bypassed

    This is the story and the technical details of how the hacker group named Fail0verflow (formerly known as Team Twiizer) discovered and exploited numerous vulnerabilities to defeat the security mechanisms of the Nintendo Wii.

    How the Nintendo Wii Security Was Bypassed
    3
    Passwords sent as plaintext?
  • You are describing TLS, which is commonly used for websites and web apps.

    Try the following command:

    openssl s_client -connect infosec.pub:443
    

    The public key, the authority that signed the certificate, and the cypher used will all be visible.

    For me, the cipher used is ECDHE-RSA-AES256-GCM-SHA384.

  • Passwords sent as plaintext?
  • Because it provides no advantage. TLS is used to secure any data sent to a server. If you don't trust the server with your password, then you should use a unique password for this website. In fact, you should always use a unique password.

    https://www.cloudflare.com/en-ca/learning/ssl/transport-layer-security-tls/

  • Passwords sent as plaintext?
  • Passwords are always sent to the server, then it is hashed to check it against the value in the database. It's also possible to view your password by inspecting login requests from other websites. TLS is used to secure it while in transit.

    Hashing is done as an extra measure of security in case the database is compromised. This measure of security would have been completely void if the server would accept password hash directly. You could log in as any user by using his compromised hash.

  • vedard 0x7d0 @infosec.pub
    Posts 6
    Comments 4