SSTI 1 – picoCTF Walkthrough
Challenge: Server-Side Template Injection (SSTI) Description: I made a cool website where you can announce whatever you want! Try it out! I heard templating is a cool and modular way to build w...
Challenge: Server-Side Template Injection (SSTI) Description: I made a cool website where you can announce whatever you want! Try it out! I heard templating is a cool and modular way to build w...
Challenge: Quantum Scrambler (picoCTF) Description: We invented a new cypher that uses “quantum entanglement” to encode the flag. Do you have what it takes to decode it? Hints: Run ev...
Challenge: PIE TIMES (picoCTF) The PIE TIMES challenge was a great intro to how binaries behave under PIE (Position Independent Executable) mode. I didn’t craft an exploit for this challenge—inste...
Enhancing Bayesian AI with Kalman Filtering for Weighted Anomaly Detection To further improve accuracy and reduce noise, we can integrate Kalman Filtering into the Bayesian AI anomaly detection sy...
Introduction: Why Bayesian Networks for Cybersecurity? Modern Intrusion Detection Systems (IDS) are often machine learning-based and require massive labeled datasets to detect threats. However, cy...
Introduction: Rethinking AI in Cybersecurity Traditional AI models rely heavily on labeled datasets to detect cyber threats. But in cybersecurity, attackers constantly evolve, creating zero-day th...
About Cryptographic failures (formerly known as Sensitive Data Exposure) refer to vulnerabilities arising from inadequate encryption practices, including data transmitted without encryption, weak a...
Introduction As I continue my journey into cybersecurity, one of the key areas I’ve been researching is web application security. The Open Web Aapplication Security Project (OSWAP) Top 10 is an es...
About: Broken Access Control occurs when an application does not properly enforce who can do what, allowing attackers to act beyond their intended permissions. This can mean regular users gaining a...
1. Introduction The Visualizer Module (visualiser.py) is a key component of the Network Traffic Analysis Toolkit, designed to convert raw network data into clear, structured visualizations. This h...