Welcome to the Jungle ðĩððĩ
This is a start of a series where we will go learn binary exploitation. We will start with explaining some basics to get everyone up to speed.
The start of a series on AES that will cover the theory behind AES and will explain some attacks that could be used against certain modes of AES.
We discuss the asymmetric signature algorithm ECDSA and its nonce reuse flaw that led to Sony's PS3 getting pwned.