#セキュリティ
10 posts-
explanationDeauthentication Attack Explained: How It Works and PMF Defense
A Deauthentication Attack (Deauth Attack) sends spoofed IEEE 802.11 Deauthentication management frames (subtype 0x0C) to...
-
explanationGhidra Explained: NSA's Open-Source Reverse Engineering Suite
Ghidra is the reverse-engineering suite the NSA used internally for nearly two decades before releasing it as open sourc...
-
explanationFirewall Explained: Five Generations, Stateful Inspection, NGFW / WAF / Cloud SG
A firewall is an access-control device that blocks traffic that doesn't match its defined rules. From DEC SEAL (1988) to...
-
explanationASM (Attack Surface Management): EASM, CAASM, DRPS Explained
ASM (Attack Surface Management) is the security discipline of continuously discovering, inventorying, prioritizing, and...
-
explanationRansomware Explained: Mechanics, Incidents, and Defenses
Ransomware is malware that 'encrypts files and demands payment for the decryption key' — a model that traces back to the...
-
explanationTrojan Horse Explained: Malware Types, Delivery, and Defenses
A Trojan horse is malware that disguises itself as legitimate software so the user installs it voluntarily — unlike viru...
-
explanationDDoS Attacks Explained: Types, Mechanisms, and Defenses
DDoS (Distributed Denial of Service) is the attack of 'burying a target under floods of (often legitimate-looking) reque...
-
explanationBuffer Overflow Explained: Stack, Exploits, and Defenses
Buffer overflow — writing past the end of an allocated buffer and corrupting adjacent memory — is the classic C/C++ vuln...
-
explanationKali Linux Explained: Pentest Distribution Toolkit
Kali Linux is a Debian-based 'attacker-optimized' Linux distribution maintained by Offensive Security (now OffSec), ship...
-
explanationHTTP/HTTPS
HTTP/HTTPS is the protocol that powers content delivery on the Web. This article covers the request/response model, meth...