Search


Cross Site Request Forgery (CSRF) Attacks
Introduction Cross-site request forgery (CSRF) is a type of attack that occurs when a malicious web request is sent to a web application...

ninp0
Jan 18, 20234 min read


LDAP Injection
Introduction LDAP injection is a type of attack that exploits the Lightweight Directory Access Protocol (LDAP) to gain unauthorized...

ninp0
Jan 18, 20233 min read


Exploiting JSON Web Token (JWT)
Introduction JSON Web Token (JWT) is an open standard that defines a secure way for transmitting information between two parties. It is...

ninp0
Jan 18, 20233 min read


Ransomware Attacks: A Comprehensive Guide
Ransomware is a type of malicious software (malware) that is deployed by cybercriminals to encrypt data on a victim’s computer,...

ninp0
Jan 18, 20233 min read


The Bancor Hack / Bancor v3 Bug Bounty Program
Introduction The Bancor compromise, commonly referred to as the Bancor hack, was a data breach that affected the cryptocurrency platform,...

ninp0
Jan 18, 20233 min read


Cross-Chain Exploitation
Introduction Cross-chain exploits are a type of attack that can be used to manipulate the data stored on two different blockchains. This...

ninp0
Jan 18, 20233 min read


Exploiting Non-Fungible Tokens (NFTs)
Non-Fungible Tokens (NFTs) are digital assets that are unique and cannot be interchanged. They are created on blockchains and can...

ninp0
Jan 18, 20233 min read


Modern Communications Jamming
Introduction Modern communications jamming is the deliberate disruption of radio communications, typically by the transmission of radio...

ninp0
Jan 17, 20233 min read


Exploiting Bitcoin: A Guide to Understanding Common Attacks and Defense Strategies
Introduction: Bitcoin has revolutionized the world of digital currencies, providing a secure and decentralized platform for transactions....

ninp0
Jan 17, 20234 min read


Smart Contract Exploitation
Smart contracts are computer programs that are written to execute automatically when certain conditions are met. They are becoming...

ninp0
Jan 17, 20233 min read


Exploiting Web3 Dapps on the Ethereum Blockchain
Introduction The Ethereum blockchain is a decentralized platform that enables developers to build and deploy decentralized applications...

ninp0
Jan 17, 20233 min read


Exploiting Vulnerabilities in Mobile Applications with Zero-Click Attacks
Introduction: Zero-click attacks are a growing concern in the field of cybersecurity, as they allow threat actors to compromise devices...

ninp0
Jan 17, 20232 min read


Exploiting Channel Subscription Messages in Web Sockets
Introduction Web sockets are an important part of modern web development and they provide a way to create real-time, two-way...

ninp0
Jan 17, 20232 min read


Code Caves in ELF Binaries
Introduction: Code caves in Executable and Linkable Format (ELF) binaries are common vulnerabilities that can be exploited by attackers...

ninp0
Jan 13, 20233 min read


Becoming a Licensed Ham Radio Operator
Introduction Offensive security researchers are the people who are responsible for finding and exploiting vulnerabilities in computer...

ninp0
Jan 13, 20232 min read


Escaping Docker Containers
Introduction Docker containers are widely used for applications and services due to their flexibility and portability. However, they also...

ninp0
Jan 13, 20232 min read


DoS Vulnerabilities vs DDoS Attacks
Distributed Denial of Service (DDoS) attacks and Denial of Service (DoS) vulnerabilities have become increasingly common in today’s...

ninp0
Jan 13, 20233 min read


Type Juggling Vulnerabilities
Introduction Type juggling is a common programming language feature that allows a single variable to be treated as multiple types. It is...

ninp0
Jan 13, 20233 min read


Remote File Inclusion Vulnerabilities
Introduction Malicious Remote File Include (RFI) vulnerabilities are a type of cyber attack that allow an attacker to inject malicious...

ninp0
Jan 13, 20233 min read


Malicious File Uploads
Malicious file upload vulnerabilities are a major security threat for any organization. They can be used to upload malicious files to a...

ninp0
Jan 13, 20232 min read

