okba-sec.hashnode.devWeaponizing SSH_AUTH_SOCK Hijack : Real-World Exploitation TechniquesAuthor : GUIAR OQBA ๐งฉ Introduction: SSH (Secure Shell) is one of the most critical secure communication protocols in modern systems. It is widely used for secure remote access, system administration, and server management.One of the core components...Jul 28, 2025ยท5 min read
okba-sec.hashnode.dev๐ Concerning Repetitions in 24-Word Mnemonic Phrases๐ค By GUIAR OQBA โ ELKANTARA โ ๏ธ Note: This article contains a summarized version of the full technical report. To view the complete version including detailed images, visit:๐ https://zenodo.org/records/15786076 ๐ General Introduction & Tools Use...Jul 22, 2025ยท4 min read
okba-sec.hashnode.devStatistical Weaknesses in BIP39 Seed Phrases and Their Real-World ImplicationsIntroduction The BIP39 standard plays a crucial role in cryptocurrency wallets by generating mnemonic seed phrases that provide access to user funds. While considered secure by design, BIP39 may suffer from statistical weaknesses in its real-world im...Apr 19, 2025ยท3 min read