Search


Deserialization Attacks
Deserialization is the process of turning a stream of bytes into an object. It is used when transferring data between applications,...

ninp0
Jan 13, 20233 min read


HTTP Response Splitting
HTTP Response Splitting HTTP response splitting is a type of web application vulnerability that can be exploited by an attacker to inject...

ninp0
Jan 12, 20232 min read


HTTP Request Smuggling
Introduction HTTP Request Smuggling is a type of attack that can be used to exploit web applications and web servers. It is a method of...

ninp0
Jan 12, 20233 min read


Server Side Request Forgery (SSRF)
Server-Side Request Forgery (SSRF) is a type of attack that allows an attacker to force a server to make requests to arbitrary...

ninp0
Jan 11, 20233 min read


Insecure Direct Object Reference (IDOR)
INTRODUCTION Insecure Direct Object Reference (IDOR) attacks are a type of vulnerability in which an attacker can gain access to a...

ninp0
Jan 11, 20232 min read


Credential Stuffing
Credential stuffing is a type of cyber attack in which stolen usernames and passwords are used to gain unauthorized access to accounts on...

ninp0
Jan 11, 20233 min read


Null Pointer Vulnerabilities
Null pointer vulnerabilities are a type of software bug that can lead to serious security issues. They occur when a program attempts to...

ninp0
Jan 11, 20232 min read


Sub-Domain Hijacking: What Is It and How to Prevent It
Sub-domain hijacking is a type of cyber attack in which an attacker takes over a sub-domain of a legitimate website to gain control of...

ninp0
Jan 10, 20233 min read


UAF Vulnerabilties
Use-after-free vulnerabilities are a type of memory corruption vulnerability that can lead to serious security issues and even remote...

ninp0
Jan 10, 20233 min read


Local File Inclusion Vulnerabilities (LFI)
Malicious Local File Include Vulnerabilities Local File Include (LFI) vulnerabilities are one of the most common and dangerous types of...

ninp0
Jan 10, 20233 min read


Purple Team Testing: A Comprehensive Guide
Purple team testing is an increasingly popular security practice that combines the best aspects of both red and blue team testing. By...

ninp0
Jan 10, 20233 min read


Zero Trust
Introduction In today’s world, where cyber-attacks are becoming increasingly common, organizations are looking for ways to protect their...

ninp0
Jan 9, 20233 min read


Software Defined Radio for Penetration Testing
Introduction Software Defined Radio (SDR) systems are becoming increasingly popular among information security professionals as they...

ninp0
Jan 8, 20232 min read


Firmware Analysis with binwalk
When it comes to reverse engineering firmware images, binwalk is truly a tool of its own class. But what exactly is binwalk and how can...

ninp0
Jan 7, 20233 min read


Introduction to Extracting Firmware from IoT Devices
The Internet of Things (IoT) is made up of interconnected devices, sensors, and objects that can communicate with each other over the...

ninp0
Jan 6, 20233 min read


Rowhammer Vulnerabilities
Introduction Rowhammer is a type of computer security vulnerability that arises from a hardware defect in certain types of dynamic random...

ninp0
Jan 5, 20233 min read


Security Implications of Autonomous Navigation
Introduction Autonomous navigation has become increasingly popular and accessible due to advances in artificial intelligence, machine...

ninp0
Jan 5, 20233 min read


Exploiting Race Conditions
Race conditions are a type of vulnerability in software and hardware that occurs when two or more operations are being performed on the...

ninp0
Jan 5, 20233 min read


Open Source Intelligence (OSINT)
Page 1 – What is OSINT? Open Source Intelligence (OSINT) is a type of intelligence gathering that involves relying on open sources to...

ninp0
Jan 4, 20232 min read



