Nayan DasLight CommandsWhat are light commands? Light commands are audio-based command injection into the voice-controlled smart home devices where an attacker…Dec 24, 2020Dec 24, 2020
Nayan DasWhat is OAuth 2.0 and How it worksHow oauth 2.0 works. Roles in OAuth 2.0. Steps of access token generation and authorization process.Aug 30, 2020Aug 30, 2020
Nayan DasHow to make a Linux Based KeyloggerUnderstand how keylogger works. How the keys are mapped and saved in a file.Aug 29, 2020Aug 29, 2020
Nayan DasCBC-bit FlippingA cryptographic attack that is based on bit alteration in IV in CBC mode of operation and bring the required change in PTApr 8, 2020Apr 8, 2020