Kro’s Nest
Home of m5kro
Latest Posts
-
VMs VS Baremetal in Cybersecurity
Virtual machines (VMs) have been around for a long time. Many people use them daily for various tasks, but let’s focus on VMs for offensive and defensive cybersecurity. Offensive Virtual Machines Pros: Quickly spin up premade images Supports most OS’s Little to no risk of corrupting the host system Cons: May be slow due to…
-
Bluetooth LE Encryption
A few days ago, I stumbled upon BLEUnlock, a project that used BLE (Bluetooth Low Energy) to unlock Mac devices based on the proximity of a secondary device, like an iPhone or Apple Watch. After roughly looking through the repository, it became apparent that the software lacked encrypted communications to facilitate authentication. Instead, it merely…
-
What Your Browser Gives Away
Ever wonder what information websites get from your browser? At first glance, you might think it’s just basic stuff, like a return address, but it’s much more complicated than it seems. In this article, we’ll go over what sites can see about your device and why they would need this data. Note: You can check…