We use Google Analytics to analyze our traffic. By clicking "Accept", you consent to our use of cookies. Read more
  • Index
  • About me
  • Résumé
  • Projects
  • Reading List
Coding (13) | Data (25) | Legal (41) | NUS (3) | Security (123) | Server (31) | Untagged (20) | Archives (217)
Nov 15, 2014

A different kind of birthday attack

Considering how many people actually use their birthday as their ATM pin, this is bad from a security standpoint.

image



Tags: Security

Similar Articles

Intelligence-led Red Teaming - When conducting Red Team attacks, I believe it is important to use an intelligence-led approach when doing scenario planning. This is sometimes also known as threat actor emulation. Such an ...
Facebook Open Graph Tags Modification - A couple of weeks ago, I discovered that Facebook allowed you to change the title and description of links that you post. This allows you to craft some pretty interesting posts. For example: ...
Bank Token Teardown - My hardware token ran out of battery recently. Before throwing it out, I opened it up to remove the battery so I can dispose of it separately. I decided to take the opportunity to sneak a quick ...
NTFS Owner Rights for Logging - I recently stumbled across the NTFS Owner Rights security principal. This is an obscure security principal that is used to restrict the rights that the owner of the file has. This can come in ...

×
Privacy & Disclaimer | Atom Feed | Sitemap
This site uses the voce theme by Benjamin Lim
Page generated on Thu Nov 6 19:49:14 2025
© 2012-2025 Benjamin Lim