Search
ninp0
Jan 11, 20232 min read
Null Pointer Vulnerabilities
Null pointer vulnerabilities are a type of software bug that can lead to serious security issues. They occur when a program attempts to...
4 views0 comments
ninp0
Jan 10, 20233 min read
Sub-Domain Hijacking: What Is It and How to Prevent It
Sub-domain hijacking is a type of cyber attack in which an attacker takes over a sub-domain of a legitimate website to gain control of...
8 views0 comments
ninp0
Jan 10, 20233 min read
UAF Vulnerabilties
Use-after-free vulnerabilities are a type of memory corruption vulnerability that can lead to serious security issues and even remote...
7 views0 comments
ninp0
Jan 10, 20233 min read
Local File Inclusion Vulnerabilities (LFI)
Malicious Local File Include Vulnerabilities Local File Include (LFI) vulnerabilities are one of the most common and dangerous types of...
1 view0 comments
ninp0
Jan 10, 20233 min read
Purple Team Testing: A Comprehensive Guide
Purple team testing is an increasingly popular security practice that combines the best aspects of both red and blue team testing. By...
10 views0 comments
ninp0
Jan 9, 20233 min read
Zero Trust
Introduction In today’s world, where cyber-attacks are becoming increasingly common, organizations are looking for ways to protect their...
4 views0 comments
ninp0
Jan 8, 20232 min read
Software Defined Radio for Penetration Testing
Introduction Software Defined Radio (SDR) systems are becoming increasingly popular among information security professionals as they...
12 views0 comments
ninp0
Jan 7, 20233 min read
Firmware Analysis with binwalk
When it comes to reverse engineering firmware images, binwalk is truly a tool of its own class. But what exactly is binwalk and how can...
11 views0 comments
ninp0
Jan 6, 20233 min read
Introduction to Extracting Firmware from IoT Devices
The Internet of Things (IoT) is made up of interconnected devices, sensors, and objects that can communicate with each other over the...
42 views0 comments
ninp0
Jan 5, 20233 min read
Rowhammer Vulnerabilities
Introduction Rowhammer is a type of computer security vulnerability that arises from a hardware defect in certain types of dynamic random...
4 views0 comments
ninp0
Jan 5, 20233 min read
Security Implications of Autonomous Navigation
Introduction Autonomous navigation has become increasingly popular and accessible due to advances in artificial intelligence, machine...
3 views0 comments
ninp0
Jan 5, 20233 min read
Exploiting Race Conditions
Race conditions are a type of vulnerability in software and hardware that occurs when two or more operations are being performed on the...
3 views0 comments
ninp0
Jan 4, 20232 min read
Open Source Intelligence (OSINT)
Page 1 – What is OSINT? Open Source Intelligence (OSINT) is a type of intelligence gathering that involves relying on open sources to...
45 views0 comments
ninp0
Jan 2, 20232 min read
Adversary Simulation Testing a.k.a. Red Teaming
Page 1: Red Teaming: Enhancing Your Organization’s Security Through Adversary Simulation In today’s ever-evolving digital landscape,...
3 views0 comments
ninp0
Jan 1, 20233 min read
What is the PWN Automation Framework?
Introduction Welcome to the Ruby PWN security automation framework! In this blog post, we'll explore why and how Ruby PWN can help you to...
5 views0 comments
ninp0
Jan 1, 20232 min read
What is Return-Oriented Programming (ROP)?
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of...
4 views0 comments
ninp0
Dec 31, 20222 min read
Benefits of Bug Bounty Programs in an Organization
Page 1: Introducing Bug Bounty Programs Bug bounty programs have become an important part of the digital world. They are used by...
3 views0 comments
ninp0
Dec 29, 20222 min read
Secure Boot Chain Fundamentals for Embedded Systems
Introduction Secure Boot is a system that is used to ensure the integrity and authenticity of the code that is executing on a given...
4 views0 comments
ninp0
Dec 28, 20222 min read
Hardware Hacking
Hardware hacking is a skill that is becoming increasingly relevant in today’s interconnected world. Hardware hacking involves the...
2 views0 comments