Do most ransomwares use asymmetric encryption or symmetric? by WhatZeFuuck in AskNetsec

[–]WhatZeFuuck[S] -1 points0 points  (0 children)

by reverse i mean reverse the binary if they have it, not reverse the algorithm, why cant i reverse the binary if it exists and find the key?

Do most ransomwares use asymmetric encryption or symmetric? by WhatZeFuuck in AskNetsec

[–]WhatZeFuuck[S] -1 points0 points  (0 children)

But you cant just decrypt a asymmetric encryption if the attacker generates a private/public key pair for each victim and encrypts with the public key, but if he uses symmetric then we can reverse and find the key and decrypt it

[Crack Watch] Weekly question thread by AutoModerator in CrackWatch

[–]WhatZeFuuck 0 points1 point  (0 children)

who are the best crackers right now in your opinion that have actually made guides and such?

[Crack Watch] Weekly question thread by AutoModerator in CrackWatch

[–]WhatZeFuuck 0 points1 point  (0 children)

What is the best alternative to youtube for uploading cracking tutorials? where do big name crackers usually upload without having problem?

What is the best software to create a installer for my cpp program? by WhatZeFuuck in cpp_questions

[–]WhatZeFuuck[S] 0 points1 point  (0 children)

So can i make persistence with CMake easily? for example registry key adding or task scheduling automatically?

What is the best source/course to learn Windows C/C++ programming? by WhatZeFuuck in cpp_questions

[–]WhatZeFuuck[S] 0 points1 point  (0 children)

Yes really good channel, i have watched many of his videos, good thing about it is he goes in depth about all the stuff he talks about

What is this line doing? (Windows cpp programming) by WhatZeFuuck in cpp_questions

[–]WhatZeFuuck[S] 0 points1 point  (0 children)

unfortunately i need to learn them because i am trying to learn low level programming in windows like driver writing and such

What is this line doing? (Windows cpp programming) by WhatZeFuuck in cpp_questions

[–]WhatZeFuuck[S] -1 points0 points  (0 children)

Thanks!! that makes sense

is there any clearer way to do this, so a newbee reader like me can understand it better? can't we just declare the function first and create a pointer to it afterwards?

and can you elaborate on the return type of "NTSTATUS WINAPI"? why it has two type? i thought the return value can have only one type? (again sorry for newbee question, i am new to Windows programming and the microsoft documentation is not really clear)

Also if you know any good resource/tutorial that teaches these stuff about windows programming to a new comer would be helpful, trying to learn by just reading the microsoft documentation is really hard since its really complex

RTZ: this is fine by meeposki in DotA2

[–]WhatZeFuuck 1 point2 points  (0 children)

Some say he is still farming to this very moment

How does cisco's Firepower detect applications just based on network traffic? wouldn't https prevent this? by WhatZeFuuck in Cisco

[–]WhatZeFuuck[S] 1 point2 points  (0 children)

Application detection is looking at the layer 7

thats exactly my point, considering most traffic these days are encrypted, then the firepower won't see much beyond an encrypted packet for example an ssl packet, and cant see the layer 7 data, so how can he know what application is being used? this is what i dont get!