How to Block ECH and Mitigate DoH in Enterprise Networks
A hands-on guide using dnsmasq to filter SVCB and HTTPS records for disabling ECH and enforcing central DNS policies. Notes that DoH requires separate network-layer policies.
Representative Foreword
The representative foreword of this blog: security now fails less at finding issues than at absorbing, sustaining, and acting on what has already been found.
This essay frames the entire site first. The posts on technical analysis, method, and governance all start from this same problem statement.

Detection, Method, Governance
A hands-on guide using dnsmasq to filter SVCB and HTTPS records for disabling ECH and enforcing central DNS policies. Notes that DoH requires separate network-layer policies.
Comprehensive analysis of XML-RPC security flaws including RCE, XXE, and DDoS, with mitigation strategies and a Python PoC exploit.
Citrix administrators apply security policies to each user’s VDI (Virtual Desktop Infrastructure) through Citrix Group Policy. However, certain structural vulnerabilities in Citrix CSE (Citrix Service Engine) and the Citrix VDI Agent allow for potential bypassing of these security policies.
Real cases where manipulated KPI metrics led to cybersecurity incidents, exposing the dangers of metric-driven security management.
Three common misconceptions that weaken security assessments and strategies to build repeatable, effective vulnerability evaluation.
Exploring how development culture shapes code security, with practical examples using static analysis tools like Joern.
How Citrix VDI policies can be bypassed via registry manipulation—a legal risk analysis with detection and mitigation strategies.
How government NGOs and bug bounty programs strengthen cybersecurity, with insights on security taxes and public-private collaboration.
The Java Reflection API is a powerful tool that allows dynamic manipulation of classes, methods, and interfaces at runtime. However, due to its flexibility, it introduces significant security risks, as attackers can exploit it to gain unauthorized access to systems. In this article, we will explore the security threats posed by Java Reflection and outline strategies to mitigate these risks.
Why Google removed XSSAudit from Chrome and what it means for web security—analyzing the shift from XSS filters to CSP.