The Big Picture of Embedded Linux Systems
Block diagrams and high-level overview of hardware components in embedded Linux devices.
Block diagrams and high-level overview of hardware components in embedded Linux devices.
Multi-Link Operation (MLO) illustration for Wi‑Fi 7.
A comprehensive guide to cryptographic fundamentals, including symmetric and asymmetric encryption, hash algorithms, digital signatures, and practical attack methods like dictionary and brute-force attacks.
Web Server and Web Application Attacks Modern penetration testing often begins at the web layer. This post summarises typical vulnerabilities against web servers and applications, and provides h...
Understanding Social Engineering Attacks Social engineering is the art of manipulating people’s psychology to reveal confidential information or perform actions that benefit the attacker. 1. Co...
Understanding Denial of Service (DoS) Attacks This guide collects the most common DoS (Denial of Service) techniques tested in a controlled laboratory environment. Sections include network‑layer f...
Notes on EasyMesh features and Wi‑Fi 7 related mesh mechanisms.
WPA3 features: SAE, OWE, enterprise enhancements and transition modes.
A hands-on lab guide for performing network scanning using Nmap, including host discovery, OS detection, NSE scripts, and controlled DoS in lab environments.
Step-by-step lab guide on footprinting and reconnaissance using OSINT tools such as Shodan, Google Dorking, DNS enumeration, and the Wayback Machine.