Search
ninp0
Jan 18, 20233 min read
Exploiting Non-Fungible Tokens (NFTs)
Non-Fungible Tokens (NFTs) are digital assets that are unique and cannot be interchanged. They are created on blockchains and can...
5 views0 comments
ninp0
Jan 17, 20233 min read
Modern Communications Jamming
Introduction Modern communications jamming is the deliberate disruption of radio communications, typically by the transmission of radio...
6 views0 comments
ninp0
Jan 17, 20234 min read
Exploiting Bitcoin: A Guide to Understanding Common Attacks and Defense Strategies
Introduction: Bitcoin has revolutionized the world of digital currencies, providing a secure and decentralized platform for transactions....
13 views0 comments
ninp0
Jan 17, 20233 min read
Smart Contract Exploitation
Smart contracts are computer programs that are written to execute automatically when certain conditions are met. They are becoming...
7 views0 comments
ninp0
Jan 17, 20233 min read
Exploiting Web3 Dapps on the Ethereum Blockchain
Introduction The Ethereum blockchain is a decentralized platform that enables developers to build and deploy decentralized applications...
10 views0 comments
ninp0
Jan 17, 20232 min read
Exploiting Vulnerabilities in Mobile Applications with Zero-Click Attacks
Introduction: Zero-click attacks are a growing concern in the field of cybersecurity, as they allow threat actors to compromise devices...
18 views0 comments
ninp0
Jan 17, 20232 min read
Exploiting Channel Subscription Messages in Web Sockets
Introduction Web sockets are an important part of modern web development and they provide a way to create real-time, two-way...
4 views0 comments
ninp0
Jan 13, 20233 min read
Code Caves in ELF Binaries
Introduction: Code caves in Executable and Linkable Format (ELF) binaries are common vulnerabilities that can be exploited by attackers...
30 views0 comments
ninp0
Jan 13, 20232 min read
Becoming a Licensed Ham Radio Operator
Introduction Offensive security researchers are the people who are responsible for finding and exploiting vulnerabilities in computer...
11 views0 comments
ninp0
Jan 13, 20232 min read
Escaping Docker Containers
Introduction Docker containers are widely used for applications and services due to their flexibility and portability. However, they also...
7 views0 comments
ninp0
Jan 13, 20233 min read
DoS Vulnerabilities vs DDoS Attacks
Distributed Denial of Service (DDoS) attacks and Denial of Service (DoS) vulnerabilities have become increasingly common in today’s...
6 views0 comments
ninp0
Jan 13, 20233 min read
Type Juggling Vulnerabilities
Introduction Type juggling is a common programming language feature that allows a single variable to be treated as multiple types. It is...
6 views0 comments
ninp0
Jan 13, 20233 min read
Remote File Inclusion Vulnerabilities
Introduction Malicious Remote File Include (RFI) vulnerabilities are a type of cyber attack that allow an attacker to inject malicious...
2 views0 comments
ninp0
Jan 13, 20232 min read
Malicious File Uploads
Malicious file upload vulnerabilities are a major security threat for any organization. They can be used to upload malicious files to a...
2 views0 comments
ninp0
Jan 13, 20233 min read
Deserialization Attacks
Deserialization is the process of turning a stream of bytes into an object. It is used when transferring data between applications,...
2 views0 comments
ninp0
Jan 12, 20232 min read
HTTP Response Splitting
HTTP Response Splitting HTTP response splitting is a type of web application vulnerability that can be exploited by an attacker to inject...
19 views0 comments
ninp0
Jan 12, 20233 min read
HTTP Request Smuggling
Introduction HTTP Request Smuggling is a type of attack that can be used to exploit web applications and web servers. It is a method of...
10 views0 comments
ninp0
Jan 11, 20233 min read
Server Side Request Forgery (SSRF)
Server-Side Request Forgery (SSRF) is a type of attack that allows an attacker to force a server to make requests to arbitrary...
3 views0 comments
ninp0
Jan 11, 20232 min read
Insecure Direct Object Reference (IDOR)
INTRODUCTION Insecure Direct Object Reference (IDOR) attacks are a type of vulnerability in which an attacker can gain access to a...
4 views0 comments
ninp0
Jan 11, 20233 min read
Credential Stuffing
Credential stuffing is a type of cyber attack in which stolen usernames and passwords are used to gain unauthorized access to accounts on...
11 views0 comments