-
ExplanationNmap Explained: Port Scanning, Service Detection, and OS Fingerprinting
Nmap (Network Mapper) is an open-source scanner for discovering hosts and services on a network. Released by Fyodor in 1...
-
ExplanationXSS Explained: How Cross-Site Scripting Works and How to Defend Against It
Cross-Site Scripting (XSS) is a vulnerability that lets an attacker inject malicious scripts into a web application so t...
-
ExplanationDeauthentication Attack Explained: How It Works and PMF Defense
A Deauthentication Attack (Deauth Attack) sends spoofed IEEE 802.11 Deauthentication management frames (subtype 0x0C) to...
-
ExplanationGhidra Explained: NSA's Open-Source Reverse Engineering Suite
Ghidra is the reverse-engineering suite the NSA used internally for nearly two decades before releasing it as open sourc...
-
ExplanationFirewall Explained: Five Generations, Stateful Inspection, NGFW / WAF / Cloud SG
A firewall is an access-control device that blocks traffic that doesn't match its defined rules. From DEC SEAL (1988) to...
-
ExplanationASM (Attack Surface Management): EASM, CAASM, DRPS Explained
ASM (Attack Surface Management) is the security discipline of continuously discovering, inventorying, prioritizing, and...
-
ExplanationRansomware Explained: Mechanics, Incidents, and Defenses
Ransomware is malware that 'encrypts files and demands payment for the decryption key' — a model that traces back to the...
-
ExplanationTrojan Horse Explained: Malware Types, Delivery, and Defenses
A Trojan horse is malware that disguises itself as legitimate software so the user installs it voluntarily — unlike viru...
-
ExplanationDDoS Attacks Explained: Types, Mechanisms, and Defenses
DDoS (Distributed Denial of Service) is the attack of 'burying a target under floods of (often legitimate-looking) reque...
-
ExplanationBuffer Overflow Explained: Stack, Exploits, and Defenses
Buffer overflow — writing past the end of an allocated buffer and corrupting adjacent memory — is the classic C/C++ vuln...
-
ExplanationKali Linux Explained: Pentest Distribution Toolkit
Kali Linux is a Debian-based 'attacker-optimized' Linux distribution maintained by Offensive Security (now OffSec), ship...
-
ExplanationLinux Explained: Architecture, Commands, and Distros
Strictly speaking, 'Linux' refers only to the kernel; what we use day-to-day is a stack of Linus's kernel + the GNU user...