Security Engineer — What makes a security engineer? Ch.1Chapter 1 — Vulnerability ManagementNov 27, 2024Nov 27, 2024
Microservices: From 0 to OK 👌In this write up, lets start by designing an e-commerce application and gradually re-designing them as microservices as well as how to…Aug 31, 2024Aug 31, 2024
CSRF: The Fake Door to Your Sensitive DataThis is a continuation of my previous story on CORS Misconfiguration: The Hidden Door to Your Sensitive Data and I will try to use the same…Aug 24, 2024Aug 24, 2024
CORS Misconfiguration: The Hidden Door to Your Sensitive DataAnalogy: Imagine you have a special guest list for your house party, allowing only certain friends to enter. If you accidentally leave the…Aug 21, 2024Aug 21, 2024
TLS Certificate handshake and provisioningThe SSL handshake process begins with the client initiating communication by sending a ClientHello message, which includes the maximum…Aug 18, 2024Aug 18, 2024
My Notes on Kubernetes v1This is dedicated for people, like me, who have a hard time understanding the kubernetes components 🤓Jul 21, 2024Jul 21, 2024
Universal Windows Shellcode — part 1Writing a universal shellcode exploit for Windows Operating SystemsDec 28, 2020Dec 28, 2020
Bypassing Windows DEP (Data Execution Prevention) Using ROP (Return Oriented Programming)Another perspective in bypassing AlwaysOn DEPSep 26, 2020Sep 26, 2020