Search


Exploiting Non-Fungible Tokens (NFTs)
Non-Fungible Tokens (NFTs) are digital assets that are unique and cannot be interchanged. They are created on blockchains and can...

ninp0
Jan 18, 20233 min read
Â
Â
Â


Modern Communications Jamming
Introduction Modern communications jamming is the deliberate disruption of radio communications, typically by the transmission of radio...

ninp0
Jan 17, 20233 min read
Â
Â
Â


Exploiting Bitcoin: A Guide to Understanding Common Attacks and Defense Strategies
Introduction: Bitcoin has revolutionized the world of digital currencies, providing a secure and decentralized platform for transactions....

ninp0
Jan 17, 20234 min read
Â
Â
Â


Smart Contract Exploitation
Smart contracts are computer programs that are written to execute automatically when certain conditions are met. They are becoming...

ninp0
Jan 17, 20233 min read
Â
Â
Â


Exploiting Web3 Dapps on the Ethereum Blockchain
Introduction The Ethereum blockchain is a decentralized platform that enables developers to build and deploy decentralized applications...

ninp0
Jan 17, 20233 min read
Â
Â
Â


Exploiting Vulnerabilities in Mobile Applications with Zero-Click Attacks
Introduction: Zero-click attacks are a growing concern in the field of cybersecurity, as they allow threat actors to compromise devices...

ninp0
Jan 17, 20232 min read
Â
Â
Â


Exploiting Channel Subscription Messages in Web Sockets
Introduction Web sockets are an important part of modern web development and they provide a way to create real-time, two-way...

ninp0
Jan 17, 20232 min read
Â
Â
Â


Code Caves in ELF Binaries
Introduction: Code caves in Executable and Linkable Format (ELF) binaries are common vulnerabilities that can be exploited by attackers...

ninp0
Jan 13, 20233 min read
Â
Â
Â


Becoming a Licensed Ham Radio Operator
Introduction Offensive security researchers are the people who are responsible for finding and exploiting vulnerabilities in computer...

ninp0
Jan 13, 20232 min read
Â
Â
Â


Escaping Docker Containers
Introduction Docker containers are widely used for applications and services due to their flexibility and portability. However, they also...

ninp0
Jan 13, 20232 min read
Â
Â
Â


DoS Vulnerabilities vs DDoS Attacks
Distributed Denial of Service (DDoS) attacks and Denial of Service (DoS) vulnerabilities have become increasingly common in today’s...

ninp0
Jan 13, 20233 min read
Â
Â
Â


Type Juggling Vulnerabilities
Introduction Type juggling is a common programming language feature that allows a single variable to be treated as multiple types. It is...

ninp0
Jan 13, 20233 min read
Â
Â
Â


Remote File Inclusion Vulnerabilities
Introduction Malicious Remote File Include (RFI) vulnerabilities are a type of cyber attack that allow an attacker to inject malicious...

ninp0
Jan 13, 20233 min read
Â
Â
Â


Malicious File Uploads
Malicious file upload vulnerabilities are a major security threat for any organization. They can be used to upload malicious files to a...

ninp0
Jan 13, 20232 min read
Â
Â
Â


Deserialization Attacks
Deserialization is the process of turning a stream of bytes into an object. It is used when transferring data between applications,...

ninp0
Jan 13, 20233 min read
Â
Â
Â


HTTP Response Splitting
HTTP Response Splitting HTTP response splitting is a type of web application vulnerability that can be exploited by an attacker to inject...

ninp0
Jan 12, 20232 min read
Â
Â
Â


HTTP Request Smuggling
Introduction HTTP Request Smuggling is a type of attack that can be used to exploit web applications and web servers. It is a method of...

ninp0
Jan 12, 20233 min read
Â
Â
Â


Server Side Request Forgery (SSRF)
Server-Side Request Forgery (SSRF) is a type of attack that allows an attacker to force a server to make requests to arbitrary...

ninp0
Jan 11, 20233 min read
Â
Â
Â


Insecure Direct Object Reference (IDOR)
INTRODUCTION Insecure Direct Object Reference (IDOR) attacks are a type of vulnerability in which an attacker can gain access to a...

ninp0
Jan 11, 20232 min read
Â
Â
Â


Credential Stuffing
Credential stuffing is a type of cyber attack in which stolen usernames and passwords are used to gain unauthorized access to accounts on...

ninp0
Jan 11, 20233 min read
Â
Â
Â