leap's blog

leap's blog

Security Best Practices

hacking network security

NTP Amplification Attacks: A Deep Technical Exploration

Introduction to NTP and Its Vulnerabilities In the realm of network security, understanding the intricacies of potential threats is crucial. Network Time Protocol (NTP), a protocol designed for clock synchronization between computer systems over packet-switched, variable-latency data networks, plays a vital role in the digital world. However, its very utility Read more…

By zack, 1 yearNovember 21, 2023 ago
programming security

SQL Injection at its finest

Welcome to the Deep Dive: Unraveling the Intricacies of SQL Injection with Technical Precision Welcome to a journey into the complex world of SQL Injection, an area where many of us find both nostalgia and a continual challenge. In this extended discussion, we’ll delve deeper into the mechanics of SQL Read more…

By zack, 2 yearsDecember 28, 2022 ago
Archives
  • November 2023
  • May 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • July 2022
Categories
  • hacking
  • hardware
  • kernel
  • network
  • programming
  • security
  • Uncategorized
Recent Posts
  • NTP Amplification Attacks: A Deep Technical Exploration
  • Deep Dive into CrystalDiskMark
  • The Zero Trust Model: A Deep Dive into the Future of Cybersecurity
  • Debugging Techniques for Kernel Development
  • SQL Injection at its finest
Recent Comments
  1. Ling Vongxay on Mastering Regular Expressions: A Deep Dive into the Art of Pattern Matching
  2. Travel Blog on Mastering Regular Expressions: A Deep Dive into the Art of Pattern Matching
  3. Travel Blog on SQL Injection at its finest
  4. Jerold Mattsen on Networking 101 – The layers a packet goes through
  5. Marcelino Buckson on SQL Injection at its finest
  • About
  • Blog
Hestia | Developed by ThemeIsle