Category: Uncategorized

  • Finding Optimal Lag Between Financial Assets Time Series

    Finding Optimal Lag Between Financial Assets Time Series

    I have updated my GitHub with a new Jupyter notebook. This notebook analyzes the relationship between the price movements of Bitcoin (BTC=F) and Ether (ETH-USD) over time. Specifically, it aims to find the optimal “lag” or time delay between the two cryptocurrency prices that results in the highest correlation. It begins by importing the necessary…

  • Credit Card Fraud Detection with Random Forest

    Credit Card Fraud Detection with Random Forest

    Credit card fraud is a major problem in the financial industry. Fraudulent transactions can cause significant losses for both cardholders and financial institutions. However, detecting credit card fraud is a challenging problem, especially when the data is imbalanced. This means that the number of fraudulent transactions is much lower than the number of non-fraudulent transactions.…

  • Python Monte Carlo simulation – describing a cyber threat landscape

    Python Monte Carlo simulation – describing a cyber threat landscape

    Monte Carlo simulation is a powerful mathematical technique that can be used to model a wide range of systems, from financial markets to physical systems. At its core, Monte Carlo simulation is based on the idea of using random sampling to understand the underlying probability distributions of a system. The basic idea behind Monte Carlo…

  • Hacking Mr. Robot’s box part 4 – the final flag.

    Hacking Mr. Robot’s box part 4 – the final flag.

    On the part 3 we had shell access to the webserver. So might as well rummage a bit to see if we can find the third and final flag. And there’s nothing to be found in the directories we have access to as robot. Look, conveniently, we don’t have access to the root directory: I…

  • Hacking Mr. Robot’s box part 3 – the second flag.

    Hacking Mr. Robot’s box part 3 – the second flag.

    Here we are, attempting to find the second flag. On part 2, we found the robots file – ‘robots.txt’ which contained the first flag and a few other bits of information: ‘User-agent: *’ and fsocity.dic, whatever it all means. Our NMAP HTTP enumeration revealed a few other interesting tidbits: different pages of the website are…

  • Hacking Mr. Robot’s box part 2 – the first flag.

    Hacking Mr. Robot’s box part 2 – the first flag.

    This is part 2 of the hacking walkthrough. Now that we have both boxes living securely in the same isolated network, we can actually get to the hacking bit. At the end of part 1, the NMAP scan revealed three crucial details: Mr Robot box IP address is 10.150.1.11, Mr Robot box is actually a…

  • Hacking Mr. Robot’s box part 1 – setting up a secure environment.

    Hacking Mr. Robot’s box part 1 – setting up a secure environment.

    This post is part 1 of a beginner’s tutorial on hacking Mr Robot 1 CTF box from VulnHub. The box has three hidden flags of increased difficulty and is beginner to intermediate in complexity. In this first project, I will document every basic stage of progress, including downloading, installing, and configuring the virtual machines in…