Recent Posts

An Introduction to a Few DoS Attacks

4 minute read

Introduction In a previous post, we had a look at spoofing DNS responses, which allowed us to redirect users to a web server running on our machine. In this ...

A Look At Entropy Analysis

3 minute read

I have recently delved into firmware analysis to look for vulnerabilities and came across the vital concept of entropy used in visual firmware analysis. So w...