leap's blog

leap's blog

kernel, network and reverse engineering

hacking network security

NTP Amplification Attacks: A Deep Technical Exploration

Introduction to NTP and Its Vulnerabilities In the realm of network security, understanding the intricacies of potential threats is crucial. Network Time Protocol (NTP), a protocol designed for clock synchronization between computer systems over packet-switched, variable-latency data networks, plays a Read more…

By zack, 1 yearNovember 21, 2023 ago
hardware

Deep Dive into CrystalDiskMark

Understanding SEQ1M, SEQ128K, and RND4K CrystalDiskMark is a popular disk benchmarking tool that measures the sequential and random read/write speeds of hard drives, solid state drives, and even external drives or network attached storage. It provides a comprehensive look at Read more…

By zack, 2 yearsMay 14, 2023 ago
network security

The Zero Trust Model: A Deep Dive into the Future of Cybersecurity

Introduction In the current cybersecurity landscape, where perimeter-based security has proven insufficient against sophisticated attacks, the Zero Trust model has emerged as a paradigm shift. This model, advocating “never trust, always verify,” has been instrumental in reinforcing security frameworks across Read more…

By zack, 2 yearsMay 14, 2023 ago
hacking hardware kernel programming security

Debugging Techniques for Kernel Development

Well, here we go again.. writing for those of you following my blog 🙂One of my colleagues told me he discovered my blog and found it it be very interesting. (funfact: we were clubbing on friday and I was just Read more…

By zack, 2 yearsFebruary 27, 2023 ago
programming security

SQL Injection at its finest

Welcome to the Deep Dive: Unraveling the Intricacies of SQL Injection with Technical Precision Welcome to a journey into the complex world of SQL Injection, an area where many of us find both nostalgia and a continual challenge. In this Read more…

By zack, 2 yearsDecember 28, 2022 ago
hardware kernel security

Understanding Windows Protection Rings: A Comprehensive Technical Deep Dive

Modern operating systems are built upon complex security architectures designed to enforce process isolation, restrict access to sensitive resources, and provide robust mechanisms against exploitation. Among these, the concept of protection rings remains one of the most fundamental and influential Read more…

By zack, 2 yearsDecember 27, 2022 ago
network Uncategorized

Networking 101 – The layers a packet goes through

When data is transmitted over a network, it is broken down into small units called packets. These packets are then sent through a series of layers in a process called packet switching. In this blog post, we will explore how Read more…

By zack, 2 yearsDecember 14, 2022 ago
programming

Mastering Regular Expressions: A Deep Dive into the Art of Pattern Matching

Regular expressions—often abbreviated as regex or regexp—are one of those tools that, once mastered, can transform the way you handle text. Whether you’re parsing logs, validating input, or performing advanced search and replace operations, regex offers a powerful, flexible means Read more…

By zack, 2 yearsDecember 11, 2022 ago
network security

The actual VPN blogpost (my personal opinion)

Hello there, fellow IT doodes!If you’ve been part of this whirlwind industry since the early 2000s or even before, you’ve likely witnessed the evolution of digital networks and the pivotal role of security within them. Today, I invite you to Read more…

By zack, 2 yearsDecember 8, 2022 ago
hacking hardware kernel programming security

TPM 2.0, huh?

Welcome, IT professionals! In this extended exploration of TPM 2.0 (Trusted Platform Module), we will delve deeper into its technical intricacies, advanced capabilities, and real-world applications. This journey will build upon our collective decades of experience in hardware, networking, programming, Read more…

By zack, 2 yearsDecember 3, 2022 ago
Archives
  • November 2023
  • May 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • July 2022
Categories
  • hacking
  • hardware
  • kernel
  • network
  • programming
  • security
  • Uncategorized
Recent Posts
  • NTP Amplification Attacks: A Deep Technical Exploration
  • Deep Dive into CrystalDiskMark
  • The Zero Trust Model: A Deep Dive into the Future of Cybersecurity
  • Debugging Techniques for Kernel Development
  • SQL Injection at its finest
Recent Comments
  1. Ling Vongxay on Mastering Regular Expressions: A Deep Dive into the Art of Pattern Matching
  2. Travel Blog on Mastering Regular Expressions: A Deep Dive into the Art of Pattern Matching
  3. Travel Blog on SQL Injection at its finest
  4. Jerold Mattsen on Networking 101 – The layers a packet goes through
  5. Marcelino Buckson on SQL Injection at its finest
  • About
  • Blog
Hestia | Developed by ThemeIsle