Search

Exploiting Non-Fungible Tokens (NFTs)
Non-Fungible Tokens (NFTs) are digital assets that are unique and cannot be interchanged. They are created on blockchains and can...
ninp0
Jan 18, 20233 min read
6 views
0 comments

Modern Communications Jamming
Introduction Modern communications jamming is the deliberate disruption of radio communications, typically by the transmission of radio...
ninp0
Jan 17, 20233 min read
6 views
0 comments

Exploiting Bitcoin: A Guide to Understanding Common Attacks and Defense Strategies
Introduction: Bitcoin has revolutionized the world of digital currencies, providing a secure and decentralized platform for transactions....
ninp0
Jan 17, 20234 min read
13 views
0 comments

Smart Contract Exploitation
Smart contracts are computer programs that are written to execute automatically when certain conditions are met. They are becoming...
ninp0
Jan 17, 20233 min read
7 views
0 comments

Exploiting Web3 Dapps on the Ethereum Blockchain
Introduction The Ethereum blockchain is a decentralized platform that enables developers to build and deploy decentralized applications...
ninp0
Jan 17, 20233 min read
11 views
0 comments

Exploiting Vulnerabilities in Mobile Applications with Zero-Click Attacks
Introduction: Zero-click attacks are a growing concern in the field of cybersecurity, as they allow threat actors to compromise devices...
ninp0
Jan 17, 20232 min read
20 views
0 comments

Exploiting Channel Subscription Messages in Web Sockets
Introduction Web sockets are an important part of modern web development and they provide a way to create real-time, two-way...
ninp0
Jan 17, 20232 min read
5 views
0 comments

Code Caves in ELF Binaries
Introduction: Code caves in Executable and Linkable Format (ELF) binaries are common vulnerabilities that can be exploited by attackers...
ninp0
Jan 13, 20233 min read
41 views
0 comments

Becoming a Licensed Ham Radio Operator
Introduction Offensive security researchers are the people who are responsible for finding and exploiting vulnerabilities in computer...
ninp0
Jan 13, 20232 min read
12 views
0 comments

Escaping Docker Containers
Introduction Docker containers are widely used for applications and services due to their flexibility and portability. However, they also...
ninp0
Jan 13, 20232 min read
7 views
0 comments

DoS Vulnerabilities vs DDoS Attacks
Distributed Denial of Service (DDoS) attacks and Denial of Service (DoS) vulnerabilities have become increasingly common in today’s...
ninp0
Jan 13, 20233 min read
6 views
0 comments

Type Juggling Vulnerabilities
Introduction Type juggling is a common programming language feature that allows a single variable to be treated as multiple types. It is...
ninp0
Jan 13, 20233 min read
6 views
0 comments

Remote File Inclusion Vulnerabilities
Introduction Malicious Remote File Include (RFI) vulnerabilities are a type of cyber attack that allow an attacker to inject malicious...
ninp0
Jan 13, 20233 min read
2 views
0 comments

Malicious File Uploads
Malicious file upload vulnerabilities are a major security threat for any organization. They can be used to upload malicious files to a...
ninp0
Jan 13, 20232 min read
2 views
0 comments

Deserialization Attacks
Deserialization is the process of turning a stream of bytes into an object. It is used when transferring data between applications,...
ninp0
Jan 13, 20233 min read
3 views
0 comments

HTTP Response Splitting
HTTP Response Splitting HTTP response splitting is a type of web application vulnerability that can be exploited by an attacker to inject...
ninp0
Jan 12, 20232 min read
20 views
0 comments

HTTP Request Smuggling
Introduction HTTP Request Smuggling is a type of attack that can be used to exploit web applications and web servers. It is a method of...
ninp0
Jan 12, 20233 min read
11 views
0 comments

Server Side Request Forgery (SSRF)
Server-Side Request Forgery (SSRF) is a type of attack that allows an attacker to force a server to make requests to arbitrary...
ninp0
Jan 11, 20233 min read
3 views
0 comments

Insecure Direct Object Reference (IDOR)
INTRODUCTION Insecure Direct Object Reference (IDOR) attacks are a type of vulnerability in which an attacker can gain access to a...
ninp0
Jan 11, 20232 min read
5 views
0 comments

Credential Stuffing
Credential stuffing is a type of cyber attack in which stolen usernames and passwords are used to gain unauthorized access to accounts on...
ninp0
Jan 11, 20233 min read
11 views
0 comments