Categories
ESP32 ESP8266 (ESP-01/01S) Microcontrollers Security

MAC Address Randomization

Resources

https://source.android.com/devices/tech/connect/wifi-mac-randomization#:~:text=MAC%20randomization%20prevents%20listeners%20from,and%20Wi%2DFi%20RTT%20operations.

Categories
Security

Secure Your Online Accounts With 2FA And Open Source

Categories
Git GitHub and Git Special Interest

GitHub Guides

https://guides.github.com/

Categories
BlockChain

Hashing Algorithm

Application of hash algorithm: a fingerprint on a file so you can tell whether it has been altered, and the second is to conceal passwords so you can still recognize the correct password and enable login. SHA256 of the crypto algorithm used in bitcoin, blockchain ledger.

Example: Hello World! string input into the SHA256 function will output of hash value of 7F83B1657FF1FC53B92DC18148A1D65DFC2D4B1FA3D677284ADDD200126D9069.

Any changes or modification of Hello Word! the string will result in different has value output. Sending a message “Hello World!” with its hash value to the receiver. The receiver takes that message and runs it on the sha256 function to check the output hash match sender’s hash output value. The message gets authenticated receiver hash value match sender hash value.

Note: The sha256 function cannot take hash output value and return the original string value. The hash output value of the following 7F83B1657FF1FC53B92DC18148A1D65DFC2D4B1FA3D677284ADDD200126D9069 will not return “Hello World!” from sha256 function.

Online sha256 hash generator

https://passwordsgenerator.net/sha256-hash-generator/

Blockchain ledger and sha256 relationship

Blockchain is a chain of blocks, each block connects to another block via a sha256 value. Example. [block A data with sha256 value] connect to [block B data with block A sha256 value].

In node with two blockchains, to check ONLY change of data use the final block sha256 of the block B. The sha256 value does not match this could be the block A or final block B data altered. The blockchain has been compromised for a node, that node cannot be trusted in a network.

Categories
BlockChain Special Interest

Satochi Whitepaper – BitCoin

https://bitcoin.org/bitcoin.pdf

Categories
Artificial Intelligence Special Interest

Public Dataset

https://www.kaggle.com/datasets

https://github.com/awesomedata/awesome-public-datasets

Categories
Docker Window WSL2

Docker Desktop (2.3.x) Windows WSL 2

https://docs.docker.com/docker-for-windows/wsl/

Categories
Special Interest Window WSL2

Set up your Node.js development environment with WSL 2

https://docs.microsoft.com/en-us/windows/nodejs/setup-on-wsl2

Categories
Window WSL2

Windows Subsystem Linux 2

What is WSL 2? WSL2 was announced at Microsoft Build 2019. WSL2 features a Linux kernel running inside Windows 10 and is built on the core technology of Hyper-V to provide better Linux application support and improved file performance.

WSL 2 Installation Guide

https://docs.microsoft.com/en-us/windows/wsl/install-win10

The process of enabling WSL 2 on Windows 10 is this:

  1. Enable WSL
  2. Enable ‘Virtual Machine Platform’ 
  3. Set WSL 2 as default
  4. Install a distro

Ubuntu 20.04 on WSL 2

https://ubuntu.com/wsl

Categories
Security

Web Penetration Test (WIP)

OWASP Web Security Testing Guide

https://github.com/OWASP/wstg/blob/master/document/2-Introduction/README.md#Penetration-Testing

https://github.com/OWASP/wstg/blob/master/document/3-The_OWASP_Testing_Framework/0-The_Web_Security_Testing_Framework.md

https://owasp.org/www-project-web-security-testing-guide/