Search


Null Pointer Vulnerabilities
Null pointer vulnerabilities are a type of software bug that can lead to serious security issues. They occur when a program attempts to...

ninp0
Jan 11, 20232 min read
Â
Â
Â


Sub-Domain Hijacking: What Is It and How to Prevent It
Sub-domain hijacking is a type of cyber attack in which an attacker takes over a sub-domain of a legitimate website to gain control of...

ninp0
Jan 10, 20233 min read
Â
Â
Â


UAF Vulnerabilties
Use-after-free vulnerabilities are a type of memory corruption vulnerability that can lead to serious security issues and even remote...

ninp0
Jan 10, 20233 min read
Â
Â
Â


Local File Inclusion Vulnerabilities (LFI)
Malicious Local File Include Vulnerabilities Local File Include (LFI) vulnerabilities are one of the most common and dangerous types of...

ninp0
Jan 10, 20233 min read
Â
Â
Â


Purple Team Testing: A Comprehensive Guide
Purple team testing is an increasingly popular security practice that combines the best aspects of both red and blue team testing. By...

ninp0
Jan 10, 20233 min read
Â
Â
Â


Zero Trust
Introduction In today’s world, where cyber-attacks are becoming increasingly common, organizations are looking for ways to protect their...

ninp0
Jan 9, 20233 min read
Â
Â
Â


Software Defined Radio for Penetration Testing
Introduction Software Defined Radio (SDR) systems are becoming increasingly popular among information security professionals as they...

ninp0
Jan 8, 20232 min read
Â
Â
Â


Firmware Analysis with binwalk
When it comes to reverse engineering firmware images, binwalk is truly a tool of its own class. But what exactly is binwalk and how can...

ninp0
Jan 7, 20233 min read
Â
Â
Â


Introduction to Extracting Firmware from IoT Devices
The Internet of Things (IoT) is made up of interconnected devices, sensors, and objects that can communicate with each other over the...

ninp0
Jan 6, 20233 min read
Â
Â
Â


Rowhammer Vulnerabilities
Introduction Rowhammer is a type of computer security vulnerability that arises from a hardware defect in certain types of dynamic random...

ninp0
Jan 5, 20233 min read
Â
Â
Â


Security Implications of Autonomous Navigation
Introduction Autonomous navigation has become increasingly popular and accessible due to advances in artificial intelligence, machine...

ninp0
Jan 5, 20233 min read
Â
Â
Â


Exploiting Race Conditions
Race conditions are a type of vulnerability in software and hardware that occurs when two or more operations are being performed on the...

ninp0
Jan 5, 20233 min read
Â
Â
Â


Open Source Intelligence (OSINT)
Page 1 – What is OSINT? Open Source Intelligence (OSINT) is a type of intelligence gathering that involves relying on open sources to...

ninp0
Jan 4, 20232 min read
Â
Â
Â


Adversary Simulation Testing a.k.a. Red Teaming
Page 1: Red Teaming: Enhancing Your Organization’s Security Through Adversary Simulation In today’s ever-evolving digital landscape,...

ninp0
Jan 2, 20232 min read
Â
Â
Â


What is the PWN Automation Framework?
Introduction Welcome to the Ruby PWN security automation framework! In this blog post, we'll explore why and how Ruby PWN can help you to...

ninp0
Jan 1, 20233 min read
Â
Â
Â


What is Return-Oriented Programming (ROP)?
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of...

ninp0
Jan 1, 20232 min read
Â
Â
Â


Benefits of Bug Bounty Programs in an Organization
Page 1: Introducing Bug Bounty Programs Bug bounty programs have become an important part of the digital world. They are used by...

ninp0
Dec 31, 20222 min read
Â
Â
Â


Secure Boot Chain Fundamentals for Embedded Systems
Introduction Secure Boot is a system that is used to ensure the integrity and authenticity of the code that is executing on a given...

ninp0
Dec 29, 20222 min read
Â
Â
Â


Hardware Hacking
Hardware hacking is a skill that is becoming increasingly relevant in today’s interconnected world. Hardware hacking involves the...

ninp0
Dec 28, 20222 min read
Â
Â
Â



