Jan 20 · 4 min read · Room Link: https://tryhackme.com/room/mitmdetection Task 1 Introduction Man-in-the-middle (MITM) attacks represent one of the most insidious threats in network security. In these attacks, attackers position themselves between legitimate communication...
Join discussion
Dec 21, 2025 · 5 min read · Introduction Computer networks work based on trust. Users inside a LAN trust each other to share information between them. One such important protocol is ARP (Address Resolution Protocol), which maintains a mapping of an IP address to the correspondi...
NNube commentedDec 17, 2025 · 7 min read · Tổng quan Mặc dù tháng 09 vừa qua Notepad++ đã phát hành bản vá bảo mật cho lỗ hổng nghiêm trọng CVE‑2025‑56383, nhưng đến tháng 12 Notepad++ tiếp tục phải tung bản vá khẩn cấp 8.8.9 cho một lỗ hổng nghiêm trọng trong công cụ cập nhật WinGUp (GUP.exe...
Join discussion
Dec 17, 2025 · 5 min read · Overview Although Notepad++ last September released a security patch for the critical vulnerability CVE‑2025‑56383, in December Notepad++ continued to release an emergency patch 8.8.9 for a serious vulnerability in the WinGUp update tool (GUP.exe). D...
Join discussion
Oct 14, 2024 · 7 min read · Web Application Hacking: SQL InjectionSQL Injection is one of the most common web application vulnerabilities, where an attacker can manipulate the backend database by injecting malicious SQL queries through user input fields. Consider a scenario whe...
Join discussionJul 23, 2024 · 5 min read · Man-in-the-middle (MitM) attacks pose a significant threat to web security. In these attacks, a malicious actor intercepts communication between a client and a server, allowing them to eavesdrop, manipulate, or steal data. This blog will explore how ...
Join discussion