Posts by Category


An Introduction to a Few DoS Attacks

4 minute read

Introduction In a previous post, we had a look at spoofing DNS responses, which allowed us to redirect users to a web server running on our machine. In this ...

A Look At Entropy Analysis

3 minute read

I have recently delved into firmware analysis to look for vulnerabilities and came across the vital concept of entropy used in visual firmware analysis. So w...

An Introduction to Cross-Site Scripting

4 minute read

Introduction So you’ve learned to create a PHP form recently and are very excited to set up a website with this form. You might think, “Ah, it’s just a simpl...

Back to Top ↑