Blog
Home / Blog

Zero Day in Xbox Privilege Escalation using Gaming ServiceEoP
Xbox Privilege Escalation is a serious security vulnerability on Xbox gaming platforms that could allow an attacker to escalate user privileges and gain system-level access

Leveraging Win32 APIs in C# using Platform Invokation(P/Invoke)
Win32 APIs, also referred to as Windows API or Win API by Microsoft, provide developers with an interface with the Windows operating system. They act

Unveiling Moniker Link (CVE-2024-21413): Navigating the Latest Cybersecurity Landscape
An intriguing vulnerability in Outlook’s handling of particular hyperlinks has been found, and threat actors have been known to use it in the wild. CVE-2024-21413

Process Injection: Harnessing the Power of Shellcode
Process Injection Process injection is an advanced penetration testing technique used by experienced penetration testers to introduce malicious code into non-malicious processes, infiltrating stealthily without

Decoding the Mystery: Identifying Unlabelled UART Pins
Electronics can be a challenging world, especially when working with UARTs, which makes understanding its inner workings essential. Unlabeled UART pins can present both beginners

Securing Web Uploads: Extension Denylisting
At the forefront of cybersecurity lies an ever-present battle between web defenders and attackers; one such battleground is file uploads – an integral component of

Decoding I2C: Mastering the Communication Protocol
In the early 1980s, Philips Semiconductors (now NXP Semiconductors) introduced the I2C (Inter-Integrated Circuit) protocol, revolutionizing inter-device communication in electronic devices. With just two wires,

Subdomain Enumeration: Leveraging Web Architecture’s Power
Subdomain enumeration is a critical process for researchers, security professionals, and enthusiasts delving into web architecture. By uncovering and mapping subdomains, we can gain invaluable

Exploring the Fundamentals of Rust Programming
Rust is an efficient systems programming language designed by Mozilla that stands out for its exceptional efficiency, strong memory safety guarantees, high-performance capabilities, and strong

Unveiling Vulnerabilities: Exploring SWD Attack Surface in Hardware
SWD stands as one of the lesser-noticed vulnerabilities of hardware security. Used for debugging and programming embedded systems, SWD allows developers to communicate directly with

JWT: A Deep Dive into Algorithm Confusion
Since the first time I studied JWT, I found it one of the most intriguing topics to discuss about web application security, and there are

Decoding JTAG: Unveiling and Validating Headers on Your Device
JTAG headers play an essential role in embedded systems development, allowing developers and engineers to access low-level parts of devices for debugging and testing purposes.