Search

Null Pointer Vulnerabilities
Null pointer vulnerabilities are a type of software bug that can lead to serious security issues. They occur when a program attempts to...
ninp0
Jan 11, 20232 min read
5 views
0 comments

Sub-Domain Hijacking: What Is It and How to Prevent It
Sub-domain hijacking is a type of cyber attack in which an attacker takes over a sub-domain of a legitimate website to gain control of...
ninp0
Jan 10, 20233 min read
8 views
0 comments

UAF Vulnerabilties
Use-after-free vulnerabilities are a type of memory corruption vulnerability that can lead to serious security issues and even remote...
ninp0
Jan 10, 20233 min read
7 views
0 comments

Local File Inclusion Vulnerabilities (LFI)
Malicious Local File Include Vulnerabilities Local File Include (LFI) vulnerabilities are one of the most common and dangerous types of...
ninp0
Jan 10, 20233 min read
2 views
0 comments

Purple Team Testing: A Comprehensive Guide
Purple team testing is an increasingly popular security practice that combines the best aspects of both red and blue team testing. By...
ninp0
Jan 10, 20233 min read
11 views
0 comments

Zero Trust
Introduction In today’s world, where cyber-attacks are becoming increasingly common, organizations are looking for ways to protect their...
ninp0
Jan 9, 20233 min read
5 views
0 comments

Software Defined Radio for Penetration Testing
Introduction Software Defined Radio (SDR) systems are becoming increasingly popular among information security professionals as they...
ninp0
Jan 8, 20232 min read
15 views
0 comments

Firmware Analysis with binwalk
When it comes to reverse engineering firmware images, binwalk is truly a tool of its own class. But what exactly is binwalk and how can...
ninp0
Jan 7, 20233 min read
15 views
0 comments

Introduction to Extracting Firmware from IoT Devices
The Internet of Things (IoT) is made up of interconnected devices, sensors, and objects that can communicate with each other over the...
ninp0
Jan 6, 20233 min read
45 views
0 comments

Rowhammer Vulnerabilities
Introduction Rowhammer is a type of computer security vulnerability that arises from a hardware defect in certain types of dynamic random...
ninp0
Jan 5, 20233 min read
5 views
0 comments

Security Implications of Autonomous Navigation
Introduction Autonomous navigation has become increasingly popular and accessible due to advances in artificial intelligence, machine...
ninp0
Jan 5, 20233 min read
4 views
0 comments

Exploiting Race Conditions
Race conditions are a type of vulnerability in software and hardware that occurs when two or more operations are being performed on the...
ninp0
Jan 5, 20233 min read
3 views
0 comments

Open Source Intelligence (OSINT)
Page 1 – What is OSINT? Open Source Intelligence (OSINT) is a type of intelligence gathering that involves relying on open sources to...
ninp0
Jan 4, 20232 min read
59 views
0 comments

Adversary Simulation Testing a.k.a. Red Teaming
Page 1: Red Teaming: Enhancing Your Organization’s Security Through Adversary Simulation In today’s ever-evolving digital landscape,...
ninp0
Jan 2, 20232 min read
4 views
0 comments

What is the PWN Automation Framework?
Introduction Welcome to the Ruby PWN security automation framework! In this blog post, we'll explore why and how Ruby PWN can help you to...
ninp0
Jan 1, 20233 min read
8 views
0 comments

What is Return-Oriented Programming (ROP)?
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of...
ninp0
Jan 1, 20232 min read
5 views
0 comments

Benefits of Bug Bounty Programs in an Organization
Page 1: Introducing Bug Bounty Programs Bug bounty programs have become an important part of the digital world. They are used by...
ninp0
Dec 31, 20222 min read
4 views
0 comments

Secure Boot Chain Fundamentals for Embedded Systems
Introduction Secure Boot is a system that is used to ensure the integrity and authenticity of the code that is executing on a given...
ninp0
Dec 29, 20222 min read
5 views
0 comments

Hardware Hacking
Hardware hacking is a skill that is becoming increasingly relevant in today’s interconnected world. Hardware hacking involves the...
ninp0
Dec 28, 20222 min read
2 views
0 comments