General
General
CVE Analysis: Hacking a Crypto Network for Profit
How Analyzing a simple CVE led me to takeover a Crypto Network.
Pentest: From Customer to Full Application Takeover
A story of chaining low vulnerabilities to takeover an application in a pentest project.
Introduction to IOCTL (Input/Output CONTROL)
An Introduction to Input Output CONTROL (IOCTL)
Homograph Attack: Abusing IDNs for Phishing
How to abuse IDNs for Phishing.