<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Break · Build · Repeat</title><link>http://ashishji.is-a.dev/blog/posts/</link><description>Recent content on Break · Build · Repeat</description><image><title>Break · Build · Repeat</title><url>http://ashishji.is-a.dev/blog/og-default-200.png</url><link>http://ashishji.is-a.dev/blog/og-default-200.png</link></image><generator>Hugo -- 0.152.2</generator><language>en-us</language><lastBuildDate>Thu, 19 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="http://ashishji.is-a.dev/blog/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>TOTP Explained: How a Stopwatch and Math Replaced Your Password</title><link>http://ashishji.is-a.dev/blog/posts/totp/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid>http://ashishji.is-a.dev/blog/posts/totp/</guid><description>&lt;p&gt;&lt;img alt="TOTP Thumbnail" loading="lazy" src="http://ashishji.is-a.dev/blog/posts/TOTP_thumbnail2.png"&gt;&lt;/p&gt;
&lt;p&gt;Ever wondered about that six-digit code your authenticator app displays? The one that changes every 30 seconds? That&amp;rsquo;s &lt;strong&gt;TOTP (Time-based One-Time Password)&lt;/strong&gt;, and it&amp;rsquo;s one of the most elegant pieces of security technology we use every day.&lt;/p&gt;
&lt;h2 id="the-problem-with-passwords"&gt;The Problem with Passwords&lt;/h2&gt;
&lt;p&gt;Traditional username-password authentication is inherently vulnerable. Even with complex passwords containing letters, numerals, and symbols, a single data breach from an inadequately secured server or a malicious observer looking over your shoulder can expose your credentials and grant unlimited access to your account.&lt;/p&gt;</description></item><item><title>CTF Write-up: TCS HackQuest Season 10</title><link>http://ashishji.is-a.dev/blog/posts/hackquest-2025/</link><pubDate>Fri, 19 Dec 2025 00:00:00 +0000</pubDate><guid>http://ashishji.is-a.dev/blog/posts/hackquest-2025/</guid><description>&lt;p&gt;Cybersecurity is as much about persistence as it is about technical skill. I recently participated in &lt;strong&gt;TCS HackQuest Season 10&lt;/strong&gt; (held on December 13, 2025). The competition was intense, featuring a total of 14 challenges ranging from steganography and reverse engineering to web exploitation and binary analysis.&lt;/p&gt;
&lt;p&gt;Despite some technical hurdles with the server in the final hours, I managed to successfully solve &lt;strong&gt;11 out of the 14 questions&lt;/strong&gt;. This writeup provides a brief breakdown of my approach and the logic used to solve each challenge.&lt;/p&gt;</description></item><item><title>About This Blog</title><link>http://ashishji.is-a.dev/blog/posts/about-this-blog/</link><pubDate>Tue, 16 Dec 2025 00:00:00 +0000</pubDate><guid>http://ashishji.is-a.dev/blog/posts/about-this-blog/</guid><description>&lt;p&gt;Hi, I’m Ashish. This is my blog, where I:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Document my journey in coding, security, and projects&lt;/li&gt;
&lt;li&gt;Share writeups of CTF challenges, experiments, and bypasses&lt;/li&gt;
&lt;li&gt;Explain technical concepts like TOTP, credit card verification, and system internals&lt;/li&gt;
&lt;li&gt;Record my projects, and everything else&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This is a space to learn, reflect, and maybe help someone along the way.
Posts range from mini-experiments to full project deep dives.&lt;/p&gt;
&lt;p&gt;Welcome!&lt;/p&gt;</description></item></channel></rss>