Reverse Engineering
I began, as many hackers have, by wanting to understand how things work. I disassembled toys, computers, locks and more even before I knew anything about security because I loved working out how everything was built. With my newfound security expertise, I have expanded on this art of constructively disassembling things by reverse engineering various applications to find vulnerabilities. From investigating Android applications to analysing binary applications using Ghidra and generating circuit diagrams from x-rays of PCBs, I’ve learned a lot about learning about new systems and love to apply this to novel situations.
Cryptography
From simple historic ciphers to complex modern systems, I love exploring and breaking the different ways people hide their communications. While historic ciphers do not offer much security by modern standards, they were an excellent entry point to exploring the many ways that secret messages can be revealed. While modern ciphers are significantly more complex, there are still a great many ways that they can be improperly implemented or misused in ways that leave them vulnerable to attack. I have explored various cryptographic systems and ways of breaking them, as well as attacking some poor implementations of cryptography in real world systems such as BLE smart locks.
I have also taught cryptography supervisions for the 3rd year Cambridge undergraduate course , including creating CTF-style bonus challenges for students to attempt.