Comprehensive Guide to Booting, Bootloaders, and related Attack Vectors and Security — Part 1Bootloaders are a critical component of modern computer systems, forming the bridge between the hardware and the operating system (OS). In…Jan 8Jan 8
Published inInfoSec Write-upsReviving the Fork BombFork bombing is a type of denial-of-service (DoS) attack designed to exploit system resources by recursively creating processes until the…Jan 2Jan 2
Published inILLUMINATIONReviving the Fork BombFork bombing is a type of denial-of-service (DoS) attack designed to exploit system resources by recursively creating processes until the…Dec 30, 2024Dec 30, 2024
Mastering eBPF: Harnessing the Power of Kernel-Level Security and Intrusion Prevention, and…eBPF (extended Berkeley Packet Filter) is a revolutionary technology that allows programs to run safely and efficiently in the Linux kernel…Dec 20, 2024Dec 20, 2024
Demystifying ASLR: Understanding, Exploiting, and Defending Against Memory RandomizationDisclaimer: The code and techniques provided in this blog are intended for educational purposes only. They are designed to help individuals…Dec 5, 2024Dec 5, 2024
Unmasking Browser Extensions — From Forensics to SecurityWhat are Browser Extensions?Nov 26, 2024Nov 26, 2024
Unveiling Windows Services: The Hidden Engines of Your OSOnce upon a time in the vast digital kingdom of Windows, there existed a special breed of applications known as Windows Services. Unlike…Oct 24, 2024Oct 24, 2024
When USBs Attack: Exploring the Underbelly of Malicious LNK FilesA USB (Universal Serial Bus) device is a standardized interface used for communication between computers and peripherals such as storage…Oct 13, 20241Oct 13, 20241
Whispers in the Code: Inter Process Communication (IPC) and Named Pipes For Covert C2Inter-Process Communication (IPC) refers to mechanisms that allow processes to communicate with each other within an operating system (OS)…Oct 7, 2024Oct 7, 2024
Published inInfoSec Write-upsExploring Integer Overflow — The realm of exploiting binariesWhat Does Integer Overflow Mean?Oct 6, 2024Oct 6, 2024