Category: Anti Attack

Reentrancy Attacks

Reentrancy attacks are a type of security vulnerability found in smart contracts, especially on blockchain platforms like Ethereum. They happen when a contract allows an external contract to call back into the original contract before the first function call is finished. This can let the attacker repeatedly withdraw funds or change the contractnulls state before…

Sybil Resistance

Sybil resistance is a set of techniques used to prevent or limit the impact of fake or duplicate identities in online systems. Without these protections, one person could create many accounts to unfairly influence votes, gain rewards, or disrupt services. Sybil resistance helps ensure that each user is unique and prevents abuse from people pretending…

SQL Injection

SQL Injection is a type of security vulnerability that occurs when an attacker is able to insert or manipulate SQL queries in a database via input fields in a website or application. This allows the attacker to access, modify, or delete data in the database, often without proper authorisation. SQL Injection can lead to serious…

Credential Stuffing

Credential stuffing is a type of cyber attack where hackers use stolen usernames and passwords from one website to try and log into other websites. Because many people reuse the same login details across different sites, attackers can often gain access to multiple accounts with a single set of credentials. This method relies on automated…

Red Team / Blue Team Exercises

Red Team and Blue Team exercises are structured cybersecurity activities where one group (the Red Team) acts as attackers, attempting to breach systems and find weaknesses, while another group (the Blue Team) defends against these attacks. The goal is to test and improve the security measures of an organisation by simulating real-world cyber threats in…

Penetration Testing

Penetration testing is a security practice where experts try to find and exploit weaknesses in a computer system, network, or application. The goal is to uncover vulnerabilities before malicious hackers do, helping organisations fix them. This is often done by simulating real cyberattacks in a controlled and authorised way.