PinnedaputunnCase Study: The Uber HackIn this section, we explore a cyberattack experienced by the company Uber. As in the previous case study, we will analyze the methods…Oct 1, 2023Oct 1, 2023
aputunnCyber ResilienceIn this section, we talk about abstract insights from a part of our research on a concept that plays a significant role in strengthening…Aug 14Aug 14
aputunnVulnhub: PWNOS 2.0In this part, we demonstrate two methods to compromise a target system and elevate privileges. The first method utilizes an exploitation…Jun 29Jun 29
aputunnThe Zero Trust Paradigm: A Critical Look at Its Implementation and EfficacyNIST’s Zero Trust Architecture (ZTA) uses the term ‘Zero Trust’ as a catchy phrase to draw global attention to a set of useful security…Jun 23Jun 23
aputunnVulnhub: Misdirection1I solved the CTF machine on Vulnhub and detailed the process here.Jun 22Jun 22
aputunnBackdoor Attack and Defense on a Convolutional Neural NetworkIn this part, we are going to explore backdoor attacks and defenses. We will train clean and backdoored models using the CIFAR-10 dataset…May 2May 2
aputunnEvasion Attacks on a Convolutional Neural NetworkThe task involves conducting two evasion attacks on a Machine Learning model. Initially, we train our model using the CIFAR-10 dataset…Apr 14Apr 14
aputunnAttack Analysis FrameworksIn a large-scale security incident, you would want to immediately assess where the attackers are in the kill chain. Understanding their…Jan 24Jan 24
aputunnCurrent State of the Next-Generation FirewallsThe NSS Labs 2018 Security Report, dated July 17, 2018, analyzes the performance of leading Next Generation Firewalls (NGFWs) from…Jan 21Jan 21