Base64 Beyond Encoding – Steganography and Canonical Form (part 2)

Part 1 discussed the last two or four unused bits at the end of the Base64 string. Those bits should be zeroed but generally nothing verifies that, so they can also be used for different purposes. In this final part 2, we will focus on the more obvious non-canonical forms of Base64.

Gynvael Coldwind

2024-08-19

Base64 Beyond Encoding – Steganography and Canonical Form (part 1)

A mistake very often made by beginners (and which IS NOT the topic of this post) is calling Base64 encoding “encryption”. Base64 is of course no encryption as dr Iwona Polak brilliantly explains in her newest LI entry (PL only). That being said, Base64 and some of its implementations have some curious quirks, and they will be the topics of this series of posts.

Gynvael Coldwind

2024-08-16

Top 100 assembly instructions (‍x86‍-‍64‍)

As we're in the midst of preparing an "introduction to reverse engineering and assembly" workshop (to be officially announced soon), we've asked ourselves the obvious question: which of the hundreds of x86-64 assembly instructions one should start with.

Gynvael Coldwind, Dan Murray

2024-08-12

HexArcana's 2023 Conference Highlights

Year 2023 was full of events for HexArcana. Our managing director—Gynvael Coldwind—participated in a series of cybersecurity conferences and educational events. Here is a review of our presence at the most important conferences and university meetings in Poland.

HexArcana

2024-01-03