akashrj.hashnode.devUnderstanding Buffer Overflow Attacks: A Deep DiveImagine you're filling a glass with water. Normally, you'd stop pouring when the glass is full. But what if you kept pouring? The water would spill over the edges, creating a mess. In the world of cybersecurity, a similar concept exists—it's called a...Aug 31, 2024·3 min read
akashrj.hashnode.devUnmasking Packet Spoofing: A Practical Guide with Python and ScapyIn the realm of cybersecurity, understanding both offensive and defensive techniques is crucial. One such offensive technique is packet spoofing—a method often employed by attackers to disguise their identity or deceive network systems. In this blog,...Aug 30, 2024·4 min read
akashrj.hashnode.devPacket Sniffing in Action: A Hands-On Guide Using Python and ScapyImagine you’re curious about the data flowing through your network—what’s being sent, where it’s going, and who’s communicating with who?. Packet sniffing is a powerful technique that can help you answer all these questions. In this blog, we’ll dive ...Aug 28, 2024·3 min read
akashrj.hashnode.devUnderstanding Packet Sniffing: The Good and The BadImagine you’re at a café, sipping your coffee while browsing the web. You feel secure, but little do you know, someone could be eavesdropping on your internet activity without you even realizing it. This is where packet sniffing comes into play—a pow...Aug 15, 2024·4 min read
akashrj.hashnode.devThe Birth of ARPA Net: Pioneering the Digital AgeIn today's world, the internet is as essential as the air we breathe. We use it for everything from communication and entertainment to education and business. But this omnipresent tool had a humble and ambitious beginning known as ARPA Net abbreviate...Jul 23, 2024·6 min read