Blog
Home / Blog

Securing Web Uploads: Extension Denylisting
At the forefront of cybersecurity lies an ever-present battle between web defenders and attackers; one such battleground is file uploads – an integral component of

Decoding I2C: Mastering the Communication Protocol
In the early 1980s, Philips Semiconductors (now NXP Semiconductors) introduced the I2C (Inter-Integrated Circuit) protocol, revolutionizing inter-device communication in electronic devices. With just two wires,

Subdomain Enumeration: Leveraging Web Architecture’s Power
Subdomain enumeration is a critical process for researchers, security professionals, and enthusiasts delving into web architecture. By uncovering and mapping subdomains, we can gain invaluable

Exploring the Fundamentals of Rust Programming
Rust is an efficient systems programming language designed by Mozilla that stands out for its exceptional efficiency, strong memory safety guarantees, high-performance capabilities, and strong

Unveiling Vulnerabilities: Exploring SWD Attack Surface in Hardware
SWD stands as one of the lesser-noticed vulnerabilities of hardware security. Used for debugging and programming embedded systems, SWD allows developers to communicate directly with

JWT: A Deep Dive into Algorithm Confusion
Since the first time I studied JWT, I found it one of the most intriguing topics to discuss about web application security, and there are

Decoding JTAG: Unveiling and Validating Headers on Your Device
JTAG headers play an essential role in embedded systems development, allowing developers and engineers to access low-level parts of devices for debugging and testing purposes.

Introduction to EDR Evasion: API Hooking
Endpoint Detection and Response (EDR) solutions are essential for monitoring and responding to security incidents on endpoints. These solutions employ various techniques to identify malicious

Hardware Hacking for IoT Devices – Offensive IoT Exploitation
In the world of smart devices, IoT devices are becoming more vulnerable to attacks. Hardware hacking is a technique used to exploit IoT devices at the

JTAG Security: Unlocking the Potential of Hardware Hacking
With this comprehensive guide, we aim to demonstrate how the Joint Test Action Group (JTAG) interface can provide hardware security. Created during the 1980s by

Securing AWS: Importance of Penetration Testing & Best Practices
Unlock the full potential of AWS cloud computing while ensuring robust security through effective penetration testing. As businesses depend on AWS for storage and processing,

Hacking Wireless Doorbells
As technology continues to advance, so do the methods used by hackers and security enthusiasts to explore vulnerabilities in everyday devices. One such device that