-
ExplanationTCP/IP Explained: 4-Layer Model and TCP vs UDP
TCP/IP refers both to the protocol family that powers the Internet and to the four-layer reference m...
-
ExplanationVPN Explained: IPsec, OpenVPN, and WireGuard Compared
A VPN (Virtual Private Network) is a technology that builds a virtual, encrypted private circuit on...
-
ExplanationOSI Reference Model Explained: 7 Layers and TCP/IP Mapping
The ISO Basic Reference Model — better known as the OSI 7-layer model — is the conceptual model stan...
-
ExplanationOSINT Explained: Methods, Tools, and Real Examples
OSINT (Open Source Intelligence) is the practice and culture of investigating people, organizations,...
-
ExplanationSSL/TLS Explained: HTTPS Encryption and Certificates
SSL/TLS provides encryption, authentication, and tamper-detection for Internet traffic — the 'S' in...
-
ExplanationIP Explained: IPv4, IPv6, Subnetting, and Routing
IP (Internet Protocol) is the addressing and packet-forwarding protocol at the heart of the TCP/IP s...
-
ExplanationDNS Explained: Name Resolution and Record Types
DNS is the distributed database that translates human-friendly domain names into the IP addresses co...
-
ExplanationMetasploit Framework Explained: Usage and Pentest Workflow
Metasploit Framework is the open-source attack framework for penetration testing and vulnerability v...
-
ExplanationICMP Explained: ping, traceroute, and Message Types
ICMP is the control protocol that reports errors and route conditions across IP networks. This artic...
-
ExplanationSSH Explained: Mechanism, Public-Key Auth, and Commands
SSH is the protocol for safely reaching another computer over a network. It replaced cleartext proto...
-
machineLevi
Linux EasyEasy Linux box. UDP scan reveals SNMP, snmpwalk leaks the running PostgreSQL service, COPY FROM PROG...
-
ExperimentEvilBox-One Writeup
I ran a penetration test against "EvilBox-One" from VulnHub.
-
ExperimentDemonstrating Basic SQL Injection Vulnerabilities
I built a server with XAMPP and put fundamental SQL injection vulnerabilities through their paces.
-
DevelopmentBuilding a WinAPI App That Adds Programs to the Context Menu
The Windows context menu is a useful little surface. I built a tool that lets you register your favo...
-
ExperimentVisiting the Dark Web
I read up on what the dark web actually is, then used the Tor Browser to observe it firsthand.
-
DevelopmentBuilding a Simple Port Scanner in C++
A port scanner is a tool that probes hosts on a network to find which ports are open.
-
ExperimentRunning a SYN Flood Experiment
SYN Flood is one of the easiest DoS attacks to launch against a server. I ran the experiment and wor...
-
ExperimentIntercepting a Target's Traffic with ARP Spoofing (ARP Cache Poisoning)
ARP has no built-in authentication and accepts any reply unconditionally — two flaws that attackers...
-
ExperimentStealing a Cookie with XSS
I built a deliberately vulnerable PHP search page and used it to demonstrate how a cookie can be sto...
-
DevelopmentBuilding a Simple Keylogger in C++
A keylogger is software (or hardware) that watches keyboard input and records every key that's press...
-
ExplanationHTTP/HTTPS
HTTP/HTTPS is the protocol that powers content delivery on the Web. This article covers the request/...