Kro’s Nest

Home of m5kro

Latest Posts

  • VMs VS Baremetal in Cybersecurity

    VMs VS Baremetal in Cybersecurity

    Virtual machines (VMs) have been around for a long time. Many people use them daily for various tasks, but let’s focus on VMs for offensive and defensive cybersecurity. Offensive Virtual Machines Pros: Quickly spin up premade images Supports most OS’s Little to no risk of corrupting the host system Cons: May be slow due to…

  • Bluetooth LE Encryption

    Bluetooth LE Encryption

    A few days ago, I stumbled upon BLEUnlock, a project that used BLE (Bluetooth Low Energy) to unlock Mac devices based on the proximity of a secondary device, like an iPhone or Apple Watch. After roughly looking through the repository, it became apparent that the software lacked encrypted communications to facilitate authentication. Instead, it merely…

  • What Your Browser Gives Away

    What Your Browser Gives Away

    Ever wonder what information websites get from your browser? At first glance, you might think it’s just basic stuff, like a return address, but it’s much more complicated than it seems. In this article, we’ll go over what sites can see about your device and why they would need this data. Note: You can check…