Cybersecurity Using C# to steal tokens and gain system permissions
Intro Grzegorz Tworek recently published some C code demonstrating how to steal and impersonate Windows tokens from a process. The standard way to do this is with the OpenProcess, OpenProcessToken, DuplicateTokenEx, and ImpersonateLoggedOnUser APIs. Grzegorz shows how to achieve the same using Nt* APIs, specifically NtOpenProcess, NtOpenProcessToken, NtDuplicateToken, and NtSetInformationThread. Because I’m a C# junky, I…
DevOps Top 20 Essential Linux Commands for Beginners and Sysadmins | Complete Guide
Back when I started managing servers, I remember staring at the terminal, completely lost. The blinking cursor felt like it was mocking me. Fast forward a few years, and now Linux Commands feel as natural as breathing. Whether you’re currently managing Linux servers or planning to, these twenty Linux Commands will prove essential time and time again. 1. ssh…
Cybersecurity BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)
What is BadUSB? Using the STM32F407 development board, we’ll study HID device development and implement a low-cost BadUSB. This article uses the development board for testing. Those with the means can also create a PCB prototype and print the enclosure to create a highly realistic BadUSB.BadUSB is an attack that masquerades as a USB HID…
DevOps Mastering Python Asynchronous Programming: asyncio Tutorial, Examples & Best Practices
A complete guide to Python asynchronous programming with asyncio. Learn the basics of async/await, concurrency, and best practices to build faster, more efficient web apps, API calls, and data pipelines with Python. As developers, one of the challenges we constantly face is making our applications faster and more efficient. Whether you’re building a web app,…
Embedded Ferrite Beads vs 0Ω Resistors and Inductors — Which to Use for Single-Point Grounding?
Many engineers and hobbyists often confuse the applications of ferrite beads, 0Ω resistors, and inductors.In our previous discussion, we compared these three basic components from four perspectives—appearance, schematic symbols, internal structure, and practical applications (Ferrite Beads vs 0Ω Resistors: Principles, Characteristics, and EMC Application Guide). However, one question remained unanswered: When implementing single-point grounding, should…