| Ko

ARP Spoofing Theory and Practice

What is ARP Spoofing? ARP Spoofing is a network attack technique that exploits structural vulnerabilities in the ARP (Address Resolution Protocol), which was standardized through RFC 826 by the IETF in 1982. The attacker sends falsified ARP messages to the network to manipulate the victim’s ARP cache table and intercept or modify normal communication flows. This attack is a form of Man-in-the-Middle (MITM) attack. It is possible because the ARP protocol prioritized efficiency over security during its design phase and did not include authentication or integrity verification mechanisms. ...

April 28, 2025 · 25 min · 5288 words · In-Jun

Understanding Reverse Shells

What is a Reverse Shell? A reverse shell is an attack technique that reverses the direction of typical remote access connections. The compromised target system initiates a connection to the attacker’s system, allowing the attacker to access the target’s shell. This remote command execution mechanism exploits a fundamental characteristic of modern network security architectures. Most networks implement “block inbound, allow outbound” firewall policies, and reverse shells bypass this by having the target initiate the connection. This enables attackers to access systems behind restrictive network environments, NAT configurations, and corporate firewalls. ...

April 27, 2025 · 23 min · 4752 words · In-Jun

Homelab Build Log #6: Vault Secrets Management

Overview In the previous post, we configured DDNS and port forwarding to enable external internet access to services running in the homelab Kubernetes cluster. This post covers how to install and configure HashiCorp Vault to securely manage sensitive information like passwords, API keys, and certificates in the Kubernetes cluster. Limitations of Default Kubernetes Secrets Secret management was the biggest challenge while building the homelab environment using GitOps methodology. Several limitations became clear when using default Kubernetes Secrets. ...

February 26, 2025 · 11 min · 2186 words · In-Jun

Roles of the Frontend and Backend in OAuth 2.0

OAuth 2.0 is an authorization framework standardized as RFC 6749 by the IETF (Internet Engineering Task Force) in 2012. It allows users to grant third-party applications limited access to their resources without exposing their credentials (passwords). It is now widely used for social login and API authorization across major services such as Google, Facebook, GitHub, and Twitter. The Origins of OAuth The Problem OAuth Solves Before OAuth, users had to directly provide their usernames and passwords to third-party applications, which created serious security risks. Users had no way to know which applications would safely manage their credentials, nor could they granularly control access permissions or revoke them at any time. ...

August 3, 2024 · 8 min · 1510 words · In-Jun

Web Authentication with Cookies, Sessions, and JWT

Web authentication solves a basic problem created by HTTP’s stateless nature: how a server can recognize the same user across multiple requests. Since Lou Montulli of Netscape Communications invented cookies in 1994, authentication has evolved from session-based approaches to token-based ones. Modern web applications widely use hybrid methods that combine JWT and Refresh Tokens to meet both security and scalability requirements. Understanding Authentication and Authorization The Difference Between Authentication and Authorization ...

June 2, 2024 · 11 min · 2300 words · In-Jun
[email protected]