Android is an operating system for various mobile device, such as mobile phone, tablet, smart TV, etc. The power of android comes from the use of a process virtual machine, dubbed as Dalvik Virtual Machine (DalvikVM) and later Android Run Time (ART), to abstract complicated and varying modules. You write in Java, compile it, and […]

Read More →

Data Encryption Standard (DES) or should be Data Encryption Algorithm, is a symmetric-key algorithm for the encryption of electronic data. Although this algorithm is now considered as insecure, it was highly influental in the advancement of modern cryptography. Most course on cryptography still present DES when they are discussing about block cipher especially symmetric one. […]

Read More →

Last week I delivered a presentation on seminar and workshop in Yogyakarta, Indonesia. The main theme is about digital forensic. This is the first day (seminar) slide where I give a general overview about dracos and digital forensic. Our vision is to make dracOs as a powerful linux distribution for cyber security. Digital forensic is […]

Read More →

Hi, Xathrya’s here. Two years ago I was palling to spin off some sister sites. It’s not abandoned yet, just forgotten for awhile. This time, I will gradually maintained them as well as this main site. Again, why should I create them and not using this site? At first I don’t have particular reason. Really […]

Read More →

During penetration testing, we might be lucky enough to exploit a command execution vulnerability. Soon, we want and interactive shell to penetrate deeper. Some approach involving “login” mechanism, such as add new account / SSH key / .rhosts file. However if these approach is not viable then hop would be shell, either reverse shell or […]

Read More →

Socat, a powerful tools you should have in you arsenal. Some say socat is another swiss army knife beside netcat. It is a command line based utility that establishes two bidirectional byte streams and transfer data between them. Socat has been long used for creating a simple forwarder. But, did you know that we can […]

Read More →

Imagine you are in a situation where you are using ISP which do censorship based on DNS. We might use free DNS service but quite often ISP will hijack the traffic and redirect them to their DNS. Another approach is using tool which transfer DNS traffic on top of encrypted channel, for example dnscrypt. However […]

Read More →

My role on team require me to build specific environment to do development. As you know DracOs is a LFS-based linux distribution, means we build it from ground up. We are not remastering or modify another distro. A pure linux tailored for our need. My development lab is simple. All the build is done on […]

Read More →

Thanks to Lord of Procrastination, I finally write this. Sunday, November 27th 2016 I have delivered a presentation about “hacking”. I was so honored to be one of the speaker. We had two sessions available, one for introducing DracOS and the other for main course (hacking). As DracOS developer we gave insight about what DracOS […]

Read More →

This lab might be used for my upcoming workshop. The goal of this lab is to setup “LAMP” environment on top of docker ecosystem. Technically speaking we will use simple containers on single docker host. Although the title is about DAMP (Docker, Apache, MySQL, PHP) in practice we will spawn two containers, which are: MySQL […]

Read More →