Skip to content

Commit

Permalink
Fixes company info
Browse files Browse the repository at this point in the history
  • Loading branch information
George Noseevich committed Jun 23, 2020
1 parent a2b113d commit 07d649f
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion _posts/2020-06-22-decrypting-schannel-tls-traffic.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,5 +12,5 @@ The TL;DR is as follows:
- There are ways to do similar things without admin privilege. Some of them are briefly mentioned in [related work](#2.-Related-work), and there also will be follow-up parts of the article about this.
- The **tool** for exporting the keys **is available** at [win-frida-scripts repository](https://github.com/sldlb/win-frida-scripts/tree/master/lsasslkeylog-easy), along with a short howto.

This work is part of my R&D activities at [SolidLab LLC](https://solidlab.ru) and was fully funded by the company. I'm grateful to be able to do reseach as part of my job.
This work is part of my R&D activities at [SolidLab LLC](https://solidlab.ru) and was fully funded by the company. I'm grateful to be able to do reseach as part of my job. We do offensive security, web application analysis and SDL consunting. We also develop [a WAF](https://solidwall.io/)
<!--more-->
2 changes: 1 addition & 1 deletion decrypting-schannel-tls-traffic-part-1.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ permalink: /decrypting-schannel-tls-part-1/
- There are ways to do similar things without admin privilege. Some of them are briefly mentioned in [related work](#2.-Related-work), and there also will be follow-up parts of the article about this.
- The **tool** for exporting the keys **is available** at [win-frida-scripts repository](https://github.com/sldlb/win-frida-scripts/tree/master/lsasslkeylog-easy), along with a short howto.

This work is part of my R&D activities at [SolidLab LLC](https://solidlab.ru) and was fully funded by the company. I'm grateful to be able to do reseach as part of my job.
This work is part of my R&D activities at [SolidLab LLC](https://solidlab.ru) and was fully funded by the company. I'm grateful to be able to do reseach as part of my job. We do offensive security, web application analysis and SDL consunting. We also develop [a WAF](https://solidwall.io/)

The article below is quite long and describes my journey in reverse-engineering schannel in much detail. For people experienced in windows internals and WinDBG it might be too verbose, but I inteded for it to be useful to people with little to no experience.

Expand Down

0 comments on commit 07d649f

Please sign in to comment.