Tags » Brute Force

ENUM4LYF

This is going to be an always *under construction* sort of page.
My favorite enumeration techniques will slowly appear here with more and more explanations to follow – remember #DontWaitEnumerate… 370 more words

Blog

Brute Force Attacks Conducted by Cyber Actors

Systems Affected

Networked systems

Overview

According to information derived from FBI investigations, malicious cyber actors are increasingly using a style of brute force attack known as password spraying against organizations in the United States and abroad. 881 more words

Cyber

Blog Tour + Excerpt: Collision Point by Lora Leigh

Collision Point by Lora Leigh
Series: Brute Force #1 (full reading order below)
Publication Date: February 27th 2018

From #1 bestselling author Lora Leigh comes… 4,619 more words

Excerpt

DCP-418: Can You Answer Me? [solved]

/******************************************
          Mobarak Hosen Shakil
        ICE, Islamic University
     ID: mhiceiuk(all), 29698(LOJ)
   E-mail: mhiceiuk @ (Gmail/Yahoo/FB)
 Blog: https://iuconvergent.wordpress.com
*******************************************/

#include
using namespace std;
#define IOS ios_base::sync_with_stdio(0);cin.tie(0)
#define LL long long int
#define ULL unsigned LL

const int inf=1<<30;
const int MOD=1e9+7;

int main()
{
    int n, tn, cn=0;
    scanf("%d", &tn);
    while(tn--)
    {
        scanf("%d", &n);
        int a, b;
        memset(b, 0, sizeof b);
        for(int i=1; i<=n; i++)
        {
            scanf("%d", &a);
            b[a]++;
        }

        LL tot=0;

        for(int i=1; i<=100; i++)
        {
            tot+=(b[i]*(b[i]-1)/2);
            for(int j=i+1; j<=100; j++)
            {
                int c=sqrt(i*j);
                if(c*c==i*j)
                {
                    tot+=(b[j]*b[i]);
                }
            }
        }

        printf("%lld\n", tot);

    }

    return 0;
}
Devskill Solution

An alternative to data masking

Dynamic data masking is a neat new feature in recent SQL Server versions that allows you to protect sensitive information from non-privileged users by masking… 1,000 more words

T-SQL

Wordpress, You Are Not So Strong!

(출처: medium.com)

얼마 전 WordPress가 공격을 당했다는 기사를 읽어 그에 관련한 글을 더 찾아보려 WordPress를 쳤다가 생각보다 WordPress에 관한 보안 이슈가 굉장히 많다는 것을 알게되었다. 그래서 최근 기사 몇개를 골라 짧게 정리를 해봤다. 312 more words

Attack/vulnerability

916A

Problem:

A. Jamie and Alarm Snooze

time limit per test: 2 seconds

memory limit per test: 256 megabytes

input: standard input

output: standard output

Jamie loves sleeping. 322 more words

APS