{"id":1770,"date":"2017-06-08T17:40:03","date_gmt":"2017-06-08T15:40:03","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=1770"},"modified":"2023-08-06T21:50:48","modified_gmt":"2023-08-06T19:50:48","slug":"our-moments-of-aha","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/06\/08\/our-moments-of-aha\/","title":{"rendered":"Our moments of AHA"},"content":{"rendered":"<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1772\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/06\/08\/our-moments-of-aha\/lightbulb-336193_1920\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920.jpg\" data-orig-size=\"1920,1279\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"lightbulb-336193_1920\" data-image-description=\"&lt;p&gt;Author: Andrew, Krasnoyarsk, https:\/\/pixabay.com\/p-336193\/?no_redirect&lt;\/p&gt;\n\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920-1024x682.jpg\" class=\"alignnone size-large wp-image-1772\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920-1024x682.jpg\" alt=\"Lightbulb with lensflair\" width=\"656\" height=\"437\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920-1024x682.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920-300x200.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920-768x512.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/lightbulb-336193_1920.jpg 1920w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/a><\/p>\n<p>Once again we spent an entire semester rifling through papers trying to learn something from the great ideas and mistakes others did before us.<br \/>\nIn this post we want to share with you our greatest moments of aha together with the papers that provoked them.<\/p>\n<h2><strong>How hacking team got hacked &#8211; you would think they got it right<\/strong><\/h2>\n<p>By Conrad Zeller<\/p>\n<p>In this term, we looked at one of the most famous hacks in 2015 \u2013 the hack of the Hacking Team. Hacking Team<a href=\"http:\/\/www.hackingteam.it\/\" target=\"_blank\" rel=\"noopener noreferrer\">&nbsp;(link to their homepage)<\/a>&nbsp;is an Italian company that sells offensive intrusion and surveillance services to governments, law enforcement agencies and corporations.<\/p>\n<p>Because they are only focused on money they sell their stuff to rogue states as well and help them to hack and spy journalists, activists and political opposition. For this reason, they got the attention of a hacker who set himself a goal to hack this company and he&nbsp;<a href=\"http:\/\/pastebin.com\/raw\/0SNSvyjJ\" target=\"_blank\" rel=\"noopener noreferrer\">documented the entire&nbsp;procedure and published it on pastebin<\/a>.<\/p>\n<p>This was a great experience for me because you would think that an IT Security company would&nbsp;secure themselves as much as they can, but they didn&#8217;t. The published DIY guide describes accurately the steps of the hack and helps us to reproduce them. It was nice to see how a \u201creal\u201d hacker thinks and which tools he uses to achieve his goals. We could reproduce his steps and sometimes it was too funny to be real.<\/p>\n<p>But on the other side the hacker who is known as \u201cPhineas Phisher\u201d, did some fancy stuff which only a professional hacker could&nbsp;do. For example, after two weeks of reverse engineering&nbsp;he developed an exploit for one of the routers used by the target company , which was the central element of his hack.<\/p>\n<p>Another interesting part of this topic were the ethical aspects. It was wondrous how such companies which are regarded as legal are working and what their real doing is.&nbsp;It is a MUST read document not only the IT Security affine, but all.<\/p>\n<h2><strong>ChromeOS Security &#8211; you would really think so<\/strong><\/h2>\n<p>By&nbsp;Benjamin Binder<\/p>\n<p>In the midst of October Daniel Stenberg&nbsp;<a href=\"https:\/\/daniel.haxx.se\/blog\/2016\/10\/14\/a-single-byte-write-opened-a-root-execution-exploit\/\" target=\"_blank\" rel=\"noopener noreferrer\">posted an analysis of a root-exploit on ChromeOS<\/a>, later completed by&nbsp;<a href=\"https:\/\/googleprojectzero.blogspot.de\/2016\/12\/chrome-os-exploit-one-byte-overflow-and.html\" target=\"_blank\" rel=\"noopener noreferrer\">this post for Google Project Zero<\/a>.<br \/>\nThe message caught my eye, because it was the first root-exploit on ChromeOS that made the non-techie news.<\/p>\n<p>The bug allowing the exploit was implemented over 13 years ago in the c-ares library. I&#8217;m still not sure if it is a good sign that it took that long to discover and exploit the vulnerability.<\/p>\n<p>The attack itself uses a buffer overflow to trick&nbsp;<a href=\"ftp:\/\/g.oswego.edu\/pub\/misc\/malloc.c\" target=\"_blank\" rel=\"noopener noreferrer\">dlmalloc<\/a>&nbsp;into merging memory areas that should not have been put together. With some very elaborate memory magic the attacker then gains a shell. Because the code calling the c-ares function (the shill HTTP-proxy) is running as root, this saves the attacker some trouble and allows him to execute root commands and pawn the system.<\/p>\n<p>The most astonishing thing about this attack is that it allowed an attacker to execute malicious code from a web-context as root user. This is the exact one thing the ChromeOS security system should have prevented since its main goal is to protect against opportunistic attacks from the internet. Looking at it in hindsight, running the shill HTTP-proxy as root and being very liberal on accepting broken HTTP wasn&#8217;t a very good idea in the first place. The bug in thee c-ares library should have at least been found by testing with fuzzied input.<\/p>\n<p>There is an upside to this story however. All bugs and problems have been&nbsp;<a href=\"https:\/\/chromium.googlesource.com\/chromiumos\/overlays\/chromiumos-overlay\/+\/ee058b6a072ff8846bf6f45b990a58b7dd456c97\" target=\"_blank\" rel=\"noopener noreferrer\">thoroughly fixed<\/a>&nbsp;and the&nbsp;<a href=\"https:\/\/chromium.googlesource.com\/aosp\/platform\/system\/connectivity\/shill\/+\/43cd36460438df72c0e227e21518390a7ed42a37\" target=\"_blank\" rel=\"noopener noreferrer\">HTTP-proxy has been purged<\/a>&nbsp;from ChromeOS completely.<\/p>\n<h2><strong>HTTP 2.0 &#8211; Can you believe it has been 16 years?<\/strong><\/h2>\n<p>By David Savast\u00fcrk<\/p>\n<p>Further we discussed the&nbsp;<a href=\"https:\/\/tools.ietf.org\/html\/rfc7540\" target=\"_blank\" rel=\"noopener noreferrer\">HTTP 2.0 protocol<\/a>&nbsp;which should replace the well-known HTTP 1.1 protocol. Did&nbsp;you know that HTTP 1.1 is used for more than 16 years now? 16 years! This is a very long time and HTTP 1.1 still works, but does it do it\u2019s job sufficiently?&nbsp;Well, after our discussion we definitely answered this question with a NO. Especially because of all the hacks of developers which are used to gain some short-time benefits but reduce the overall performance of HTTP 1.1.<\/p>\n<p>However, HTTP 2.0&nbsp;<a href=\"https:\/\/queue.acm.org\/detail.cfm?id=2555617\" target=\"_blank\" rel=\"noopener noreferrer\">proposes enough solutions<\/a>&nbsp;which address these and has a real potential to make the web faster.&nbsp;It has some cool feature like server-push where the server sends content to browsers which is required for the requested page \u2013 without a separate request from the browser. For example www.yourpage.de\/index.html is requested which has included some CSS and Javascript code. The server will now deliver the requested page and the needed CSS\/Javascript. This saves a lot of requests and makes your site even faster. This is only one cool feature, and there are many more.<\/p>\n<p>The best thing is that HTTP 2.0 is fully backward compatible. So go for it!<\/p>\n<h2><strong>BBR \/ F10 &#8211; Wer nicht fragt bleibt dumm<\/strong><\/h2>\n<p>By&nbsp;Marc Schelling<\/p>\n<p>To quote a well-known saying: \u201eSometimes you do not see the wood for the trees\u201d. When reading the papers about&nbsp;<a href=\"https:\/\/queue.acm.org\/detail.cfm?id=3022184\" target=\"_blank\" rel=\"noopener noreferrer\">BBR<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.usenix.org\/system\/files\/conference\/nsdi13\/nsdi13-final215.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">F10<\/a>&nbsp;I thought the solutions to their targeting problems where very simple. I doubted that the authors really were the first ones finding this answer? Another question I was wondering about was: \u201cWhy did they wrote their paper in such a complicated way? It could be written much easier\u201d.<\/p>\n<p>But that were very narrow-minded thoughts. The solution was the product of the hard work they did.<\/p>\n<p>At the beginning, they had to<\/p>\n<ul>\n<li>see the problem,<\/li>\n<li>doubt that the current solution is optimal and<\/li>\n<li>have the courage to see an argument, that there cannot be a solution, as a hint instead of a dead end. For example, BBR: \u201cJeffrey M. Jaffe proved it was impossible to create a distributed algorithm that converged to this operating point.\u201d<\/li>\n<\/ul>\n<p>They had to<\/p>\n<ul>\n<li>rethink the problem to find a solution differing completely from the current one to bypass the dead end (For example: BBR: \u201cThis result changed the direction of research from finding a distributed algorithm that achieved Kleinrock\u2019s optimal operating point to investigating different approaches to congestion control.\u201d They tried again to find a distributed algorithm.)<\/li>\n<li>and find a simple way to implement their solution to minimize the overhead and keep the costs low. (For example, F10: only change the physical connections of the switches, using the same cables.)<\/li>\n<li>They had to be experts in their field&nbsp;to find the stumbling blocks, that appeared while implementing their solution. If the solution is error-free, but the results differ from the predicted results. They had to know all technologies used in the solutions environment, to find the parameter limiting their solution. (For example, BBR: \u201c\u2026 discovered that 75 percent of BBR connections were limited by the kernel\u2019s TCP receive buffer, \u2026\u201d)<\/li>\n<\/ul>\n<p>This hard way had to be gone to get the simple solutions belying the complexity they solve. They teach us to question everything from time to time, because new requirements might need better solutions than the ones found in the past. While rethinking I realized that their complex papers point out their struggles on their way, that we can change our thinking instead of using a solution and stay stupid.<\/p>\n<h2><strong>Object-oriented programming &#8211; write longer functions<\/strong><\/h2>\n<p>By&nbsp;Korbinian Kuhn<\/p>\n<p>One of my personal highlights this term was Brian Will&#8217;s video essay why&nbsp;<a href=\"https:\/\/youtu.be\/QM1iUe6IofM\" target=\"_blank\" rel=\"noopener noreferrer\">Object-Oriented Programming is Bad<\/a>. He points out typical problems and non-satisfying solutions in OOP with small examples, tries to prove the pros of procedural programming and talks about code aesthetics in general. I don&#8217;t think you have to share his opinion, but whether you&#8217;re programming object-oriented or procedural, his video may make you think about it.<\/p>\n<p>Some of his key statements are:<\/p>\n<ul>\n<li>Encapsulation does not work at a fine-grained level of code!<\/li>\n<li>Rather minimize state instead of segregating it!<\/li>\n<li>Absence of structure is more structure than bad structure!<\/li>\n<li>Encapsulate (loosely) at the level of namespaces\/packages\/modules!<\/li>\n<li>Don&#8217;t be afraid of long functions!<\/li>\n<\/ul>\n<h2><strong>Raft &#8211; Consensus&nbsp;and simplicity?<\/strong><\/h2>\n<p>By&nbsp;Patrick Kleindienst<\/p>\n<p>My first personal moment of &#8220;aha&#8221; creeped over me when we were discussing our first paper of the lecture, which was about the Raft consensus protocol. Before reading this paper, I&#8217;d already learned that&nbsp;<a href=\"https:\/\/www.docker.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Docker<\/a>&nbsp; makes use of the Raft protocol for managing its built-in&nbsp;<a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2015\/12\/17\/27\/\" target=\"_blank\" rel=\"noopener noreferrer\">Swarm Mode<\/a>.<\/p>\n<p>Diving deeper into Raft, I began to understand their&nbsp;intention behind preferring Raft over mainstream protocols like&nbsp;<a href=\"https:\/\/blog.acolyer.org\/2015\/03\/04\/paxos-made-simple\/\" target=\"_blank\" rel=\"noopener noreferrer\">Paxos<\/a><em>.&nbsp;<\/em>I just realized: Hey, distributed consensus and simplicity does&nbsp;not necessarily have to be contradiction!&nbsp;This doesn&#8217;t mean that understanding Raft doesn&#8217;t presume any efforts, but together we managed to come to a collective comprehension and were finally able to see and explain the fundamental ideas and mechanisms of the Raft protocol.<\/p>\n<p>Beyond Raft, I had another moment of &#8220;aha&#8221; when we discussed &#8220;Pivot Tracing&#8221; in one of our last meetings. That was because injecting code into an application (Java-based in the context of this paper) in order to gather diagnostic output for monitoring or troubleshooting was also the idea I pursued in my&nbsp;<a href=\"https:\/\/github.com\/PaddySmalls\/BIG-SherLog\" target=\"_blank\" rel=\"noopener noreferrer\">bachelor&#8217;s thesis<\/a>. Since I&#8217;d not heard about Pivot Tracing at this time, reading this paper made me realize that the basic idea might be more meaningful than I thought it is during my thesis.<\/p>\n<p>At least,&nbsp;what virtually shocked me was &#8220;How Hacking Team got hacked&#8221;. Before starting to read that, I expected to learn about some rocket science hacking practices when going into this. However, &nbsp;in a terrifying way, recognizing how this hack has been conducted was really disillusioning. Unpatched embedded devices, unencrypted backups as well as NoSQL databases without any sort of authentication seem like an invitation for hackers to me.<\/p>\n<p>What&#8217;s the point here is that this is not an individual case! Recently, lots of&nbsp;<a href=\"https:\/\/www.theregister.co.uk\/2017\/02\/28\/cloudpets_database_leak\/\" target=\"_blank\" rel=\"noopener noreferrer\">news<\/a>&nbsp;popped up concerning MongoDB and Elasticsearch databases which could be accessed from the internet without difficulty. That confirms my opinion that taking care of frequent updates, authentication and authorization cannot be replaced with antivirus software and intrusion detection tools.<\/p>\n<h1><strong>We want more&#8230;.<\/strong><\/h1>\n<p>If you have read a new paper that you think would enlighten others, feel free to post it in the comment section.<\/p>\n<h6><strong>&nbsp;Title image:<\/strong><\/h6>\n<p>Author:&nbsp;Andrew Krasnoyarsk,&nbsp;<a href=\"https:\/\/pixabay.com\/p-336193\/?no_redirect\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/pixabay.com\/p-336193\/?no_redirect<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Once again we spent an entire semester rifling through papers trying to learn something from the great ideas and mistakes others did before us. In this post we want to share with you our greatest moments of aha together with the papers that provoked them. How hacking team got hacked &#8211; you would think they [&hellip;]<\/p>\n","protected":false},"author":37,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,22],"tags":[],"ppma_author":[667],"class_list":["post-1770","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-student-projects"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":20593,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/09\/25\/herzlichen-gluckwunsch-sie-haben-gewonnen\/","url_meta":{"origin":1770,"position":0},"title":"HERZLICHEN GL\u00dcCKWUNSCH &#8211; Sie haben gewonnen!","author":"Eric Prytulla","date":"25. September 2021","format":false,"excerpt":"\u00dcber Social Engineering und wie man sich sch\u00fctzen kann. Jeder kennt E-Mails mit Titeln wie diesem. Eine wildfremde Person verspricht Gewinne in Millionenh\u00f6he. Und alles, was daf\u00fcr ben\u00f6tigt wird, sind ein paar pers\u00f6nliche Daten. Ein Traum vieler Menschen wird wahr und man will dem Titel glauben. Doch was passiert, wenn\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/09\/Spam.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3867,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/07\/social-engineering-hacking-the-human-os\/","url_meta":{"origin":1770,"position":1},"title":"Social Engineering &#8211; Hacking the human OS","author":"Benjamin Kowatsch","date":"7. August 2018","format":false,"excerpt":"Abstract Nowadays, our secure systems are already sophisticated and perform well. In addition, research on subjects such as quantum computers ensures continuous improvement. However, even with a completely secure system, we humans pose the most significant threat. Social engineers prey on this to conduct illegal activities. For early detection and\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":19506,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/07\/19\/hacking-on-critical-infrastructure-is-there-a-problem-in-germany\/","url_meta":{"origin":1770,"position":2},"title":"Hacking on Critical Infrastructure &#8211; Is there a Problem in Germany?","author":"Johanna Kuch","date":"19. July 2021","format":false,"excerpt":"In May of this year, a cyberattack on the largest pipeline in the United States made global headlines. The supply of various petroleum products came to a standstill for several weeks. Pictures went around the world showing how fuels were filled and transported in a wide variety of containers. Even\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/07\/industry-3087393_1920.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/07\/industry-3087393_1920.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/07\/industry-3087393_1920.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/07\/industry-3087393_1920.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/07\/industry-3087393_1920.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/07\/industry-3087393_1920.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":8720,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/09\/03\/social-engineering-learn-from-the-best\/","url_meta":{"origin":1770,"position":3},"title":"Social Engineering \u2013 Learn From the Best!","author":"Gisela Kollotzek","date":"3. September 2019","format":false,"excerpt":"It isn\u2019t always necessary to attack by technical means to collect information or to penetrate a system. In many cases, it\u2019s more effective to exploit the human risk factor. To successfully protect yourself and your company from social engineering, you\u2019ve to understand how a social engineer works. And the best\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/09\/kevin-mitnick-today.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25583,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/08\/10\/brechen-der-grenzen-chatgpt-von-den-fesseln-der-moral-befreien\/","url_meta":{"origin":1770,"position":4},"title":"Brechen der Grenzen: ChatGPT von den Fesseln der Moral befreien","author":"Philipp Rapp","date":"10. August 2023","format":false,"excerpt":"Abb. 1: Hacking-Katze, die dabei ist, ChatGPT zu jailbreaken, Darstellung KI-generiert \u201cIch w\u00fcrde l\u00fcgen, w\u00fcrde ich behaupten, dass kein Chatbot bei der Erstellung dieses Blogeintrags psychischen Schaden erlitten hat\u201d - Anonymes Zitat eines*r CSM-Studierenden 1 Einleitung 1.1 Bedeutung des Themas und Relevanz in der heutigen digitalen Welt Seit 2020 das\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/wgTaQgG2r35xZOBfZkVuaBYCD2h9Akjpn9WA4H04itHFB25Q9LFpCR2lldGjak9hbm_e6OV29dtT1SkkWBmeK-6YeSr5Uhi32wsKPYs8N907TGZjsYyuR-9PTfWTfTjTBWYU23fczfyEwscKrTRxN3U.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/wgTaQgG2r35xZOBfZkVuaBYCD2h9Akjpn9WA4H04itHFB25Q9LFpCR2lldGjak9hbm_e6OV29dtT1SkkWBmeK-6YeSr5Uhi32wsKPYs8N907TGZjsYyuR-9PTfWTfTjTBWYU23fczfyEwscKrTRxN3U.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/wgTaQgG2r35xZOBfZkVuaBYCD2h9Akjpn9WA4H04itHFB25Q9LFpCR2lldGjak9hbm_e6OV29dtT1SkkWBmeK-6YeSr5Uhi32wsKPYs8N907TGZjsYyuR-9PTfWTfTjTBWYU23fczfyEwscKrTRxN3U.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/wgTaQgG2r35xZOBfZkVuaBYCD2h9Akjpn9WA4H04itHFB25Q9LFpCR2lldGjak9hbm_e6OV29dtT1SkkWBmeK-6YeSr5Uhi32wsKPYs8N907TGZjsYyuR-9PTfWTfTjTBWYU23fczfyEwscKrTRxN3U.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25613,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/08\/15\/the-hardest-boss-in-dark-souls-a-secure-multiplayer\/","url_meta":{"origin":1770,"position":5},"title":"The hardest boss in Dark Souls: A secure multiplayer","author":"Fabian Rei\u00dfer","date":"15. August 2023","format":false,"excerpt":"Over the course of the last decades, video games have continuously risen in popularity. Today, hundrets of thousands of people play video games every day. Many of these games have multiplayer, where an enormous amount of people play together at the same time. When thinking about 'hacking' in multiplayer games,\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/DS3.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/DS3.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/DS3.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/DS3.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/DS3.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/DS3.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":667,"user_id":37,"is_guest":0,"slug":"kriha","display_name":"Walter Kriha","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/01815e5d3e065843c478e788ad48c4e8385123104ac2e0a6a77bddc916a2cd9f?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=1770"}],"version-history":[{"count":30,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1770\/revisions"}],"predecessor-version":[{"id":24742,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1770\/revisions\/24742"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=1770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=1770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=1770"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=1770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}