A research summary that describes ways that an adversary can use AI to enhance cyber attacks
Builds on the Authorization component of Identity and Access Management system from zero to how systems are implemented today
Learn what is API security and how Postman can be used in automatic security testing of APIs
Learn how a user can act like a hoax DHCP server and situate himself as a man in the middle, and how one can prevent such attacks
Learn API security testing in action using Postman
Mathematically modelling human instinctive trust among systems to communicate security based trust reduction and redemption message
A method used among group of data scientists to identify and refine feature set for a machine learning problem
How do I simulate failure of an API endpoint that I don't have control over while performing Failure Mode and Effect Analysis?
Efficiently identifying and patching malicious software using merkle trees before the first execution by the user
Most defense systems filter out repeated DHCP requests. What if you could perform DHCP starvation without sending a DCHP request?
Set up a penetration testing environment using docker containers in docker networks to learn various types of port forwarding techniques
Learn and try out ARP spoofing all by yourself in a Docker network using Scapy!
Understanding MAC addresses and IP addresses augmented with the concept of public and private IP addresses through lucid examples
Juggling network packets between docker containers across different subnets
Wondered why Euclid's GCD theorem works?
Communicating in secret language with the trusted ones is so much fun. This blog could be a starting point for you on cryptography
Logging is a great challenge while developing a web application. Too few or too much logs are bad! See how you can adjust logging on demand
Deploying a scalable Flask app using Gunicorn and Nginx, in Docker