I did Microsoft’s BlueHat Challenge…

… and all I got was this (virtual) T-Shirt.

Sorry. Poor attempt at a joke, and not even technically true; I received two virtual T-Shirts for my Xbox Live Avatar and the blue hat proudly displayed in the picture.

A few months ago I heard of Microsoft’s BlueHat Challenge. Their post explains[......]

Read more

Removing Spammy Links (through Blind SQL Injection)

I was looking at a particularly bad example of a website littered with tens of thousands of spam comments.

There didn’t appear to be a real comment on the entire site, the oldest spam dated back several years and the most recent was barely a few days old. It seemed clear that the site owner eithe[......]

Read more

Hacking the AMX NXA-WAP250G Access Point (with a Raspberry Pi)

A post on the (aptly named) /dev/ttyS0 device hacking blog entitled "Reverse Engineering Serial Ports" reminded me that I had an AMX NXA-WAP250G Wireless Access Point that I’d been meaning to investigate for some time. I thought I’d document the process I went through while reverse enginee[......]

Read more

Scraping Google Related (with bonus PageRank)

While using Google Related some JSON formatted data is requested from Google about each page you visit; that data comes from a URL similar to the one below:

https://toolbarqueries.google.com/tbr
     ?client=navclient-auto
     &features=GR
     &ch=8e991fe19
     &q=info:http%3A%2F%2Fwww.bronco.co.uk%2F
     &oe=UTF-8
     &grv=0.6.9

(split over several lines for readability)

The response is much too wordy for me to paste here, but what jumped o[......]

Read more

Cyber Security Challenge Cipher Solution

I was pointed to the Cyber Security Challenge earlier this week, and eventually stumbled upon the cipher they offer as an “immediate opportunity to test your skills”. Despite not really understanding the point of the exercise or how it related to the other competitions mentioned, I was pleased to se[......]

Read more

Page 1 of 212