NW SecurityMechanism of outgoing e-mail address impersonation [Mailsploit] ~ Basic e-mail anti-spoof technology SMTP AUTH, DKIM, SPF / SenderID overview (merit · demerit) Commentary and relation with this attack- What is Mailsploit? Mailsploit is an att...2017.12.182021.03.13NW Security
NW SecurityIllustrate: WPA2’s vulnerability [KRACK] and Sequence of 4 way handshake Logic that can be decrypted with KRACK I...2017.10.212020.08.30NW Security
NW SecurityMan in the Middle attack (Channel-based MitM) in Wireless LAN Man in the Middle attack of Wi-Fi The vu...2017.10.202020.08.31NW Security
NW SecurityIllustrate: Differences between [Specter] & [Meltdown] (Memory Protection & KPTI mechanism) Introduction In this article "process" a...2018.02.022018.11.28NW Security
NW SecurityIllustrate : CPU vulnerabilities [Spectre], [Meltdown] and Speculative Execution (Branch Prediction, Out of Order Execution) Overview and scope of influence of Spect...2018.01.162021.01.05NW Security