KUNO
kuno
Home
RSS
KUNO
kuno
⌘
K
中文
ICTRUN
Han's Blog
All
Welcome
Subscribe to RSS
Welcome
August 25, 2025
224
About Me
This article documents my professional growth journey, from initially participating in Minecraft server operations, to...
Read More
I
Welcome
March 10, 2026
21
Installing OpenClaw? Watch Out — This Fake npm Package Deploys a RAT and Steals Everything on Your Mac
Supply chain attacks on npm are nothing new, but this one caught my attention with its sheer level...
Read More
Welcome
March 8, 2026
18
Breaking the "Unbreakable Cipher": A Full Walkthrough of the Kasiski Attack on Vigenere
A cipher got called "unbreakable" for three hundred years, then a retired military officer cracked it with pen and...
Read More
Welcome
March 3, 2026
23
Before LLMs, How Did Programs Tell Real Language from Gibberish?
Before large language models (LLMs) existed, cryptanalysis tools faced a very practical problem: brute-forcing a cipher...
Read More
C
Welcome
January 25, 2026
13
CVE-2026-24061: In-Depth Analysis of GNU InetUtils Telnetd Remote Authentication Bypass Vulnerability
On January 20, 2026, the GNU InetUtils project disclosed a critical security vulnerability...
Read More
I
Welcome
January 16, 2026
12
In-Depth Technical Analysis of BLE Spam Attacks: Apple Ecosystem Proximity Pairing Spoofing with ESP32
This paper provides a comprehensive technical analysis of BLE (Bluetooth Low Energy) spam attacks...
Read More
B
Welcome
January 9, 2026
18
Breaking Anti-Cheat: A Complete Guide from Event Hijacking to Prototype Chain Pollution
Read More
grep
Welcome
December 19, 2025
16
Best Practices for Log Analysis Using grep Commands
Log analysis is a critical component of software development and operations. Effective log querying...
Read More
Welcome
October 5, 2025
82
JSON Parser AFL++ Fuzzing Tutorial
Fuzzing has become one of the most effective techniques for discovering security vulnerabilities in software. In this...
Read More
B
Welcome
August 25, 2025
29
Buffer Overflow Vulnerability Deep Dive (Part 1): From Principles to Practical Exploitation
Deep dive into the attack principles, memory mechanisms, and practical exploitation techniques of C...
Read More
D
Welcome
August 25, 2025
14
Deep Dive into Format String Vulnerabilities: From Principles to Practical Exploitation
Format string vulnerabilities are a classic type of memory safety vulnerability, primarily...
Read More
I
Welcome
August 25, 2025
20
iOS 18.6.1 DNG Vulnerability Deep Dive (CVE-2025-43300)
In-depth analysis of a zero-day vulnerability in Apple's ImageIO framework, detailing the DNG file...
Read More
M
Welcome
August 25, 2025
20
Motorola G85 Flashing Tutorial: From Theory to Practice
This article provides a detailed tutorial on flashing the Motorola G85, covering the Android...
Read More
hello world
markdown
blog
multilingual
Welcome
August 24, 2025
29
Echo Command Explained and Penetration Testing Applications
This article delves into the various applications of the Echo command in penetration testing,...
Read More
L
Welcome
October 11, 2021
38
Life Lessons at 18-19: Learning, Socializing, and the Path to Success
This article reflects the author's life insights from the age of 18 to 19, covering learning and...
Read More
Home - ICTRUN