Cryptography2026-02-28
Basics of Cryptographic Protocols
A short foundation note on trust, key exchange, confidentiality, integrity, and protocol design.
CryptographyProtocolsTLS
Read writeupResearch / Writeups
Focused notes on cybersecurity, networking, Linux systems, cryptographic concepts, and lab experimentation.
A short foundation note on trust, key exchange, confidentiality, integrity, and protocol design.
Implementation notes on sockets, concurrency, and limits of a low-level learning scanner.
Initial notes on capture sources, timelines, host correlation, and preserving investigative context.
A practical approach to filtering captures, isolating streams, and validating network behavior in lab environments.
Half-open scanning, response interpretation, and what defenders can observe from SYN-based reconnaissance.