// Home // About // Blog // Contact

Transmissions

Signal dispatches from the cybersecurity frontier — writeups, research, and quantum thoughts

Web Security
Dec 15, 2024 12 min read 1.2K views

OWASP Top 10: A Deep Space Guide to Web Vulnerabilities

Navigating through the most critical web application security risks like charting unknown star systems. Each vulnerability is a black hole waiting to consume your data. From injection attacks to broken access control, let's map the threat landscape.

#OWASP#WebSec#Guide#Injection
Read Transmission
CTF Writeup
Nov 28, 2024 8 min read 890 views

HackTheBox: Navigating the Quantum Maze

A complete walkthrough of the "QuantumMaze" HTB machine. Involving privilege escalation through a misconfigured quantum random number generator service and creative binary exploitation.

#HTB#CTF#Writeup#PrivEsc
Read Transmission
Bug Bounty
Oct 12, 2024 6 min read 2.1K views

Bug Bounty: IDOR in Another Dimension

How a simple Insecure Direct Object Reference opened a wormhole into another user's data. The API endpoint was hiding in plain sight, leaking PII across the multiverse of endpoints.

#BugBounty#IDOR#API
Read Transmission
Cryptography
Sep 20, 2024 15 min read 1.5K views

RSA in the Quantum Age: Is Your Encryption Doomed?

An exploration of how quantum computing threatens RSA encryption. We dive into Shor's algorithm, post-quantum cryptography candidates, and what the future holds for asymmetric encryption.

#RSA#Quantum#PostQuantum#Cryptography
Read Transmission
Quantum
Aug 30, 2024 10 min read 980 views

Quantum Key Distribution: Unhackable Communication?

Exploring BB84 and other QKD protocols that promise theoretically unbreakable encryption. But is "unhackable" really achievable, or are there side-channel attacks lurking in the quantum foam?

#QKD#BB84#QuantumCrypto
Read Transmission
Web Security
Aug 05, 2024 9 min read 1.8K views

SQL Injection: Tunneling Through the Database Nebula

From basic UNION-based injections to blind boolean-based techniques. A comprehensive guide to understanding and exploiting SQL injection vulnerabilities in modern web applications.

#SQLi#WebSec#Database
Read Transmission
CTF Writeup
Jul 18, 2024 7 min read 650 views

PicoCTF: Binary Exploitation in Zero Gravity

Solving buffer overflow challenges with a cosmic twist. Stack smashing, ROP chains, and format string vulnerabilities — all in the weightless environment of competitive CTF.

#PicoCTF#BinExp#ROP
Read Transmission
Quantum
Jul 01, 2024 11 min read 720 views

Quantum Entanglement & Cybersecurity: A New Frontier

How the "spooky action at a distance" phenomenon could revolutionize secure communications. From quantum teleportation to entanglement-based authentication protocols.

#Entanglement#QuantumSec#Future
Read Transmission