Representative Foreword

After the Code, the Structure Remains

The representative foreword of this blog: security now fails less at finding issues than at absorbing, sustaining, and acting on what has already been found.

This essay frames the entire site first. The posts on technical analysis, method, and governance all start from this same problem statement.

After the Code, the Structure Remains

Detection, Method, Governance

🔥 A Mind That Dissects Systems

🔥 Trust and Culture Beyond Technology

🔥 Code That Fixes, Not Just Runs

How to Block ECH and Mitigate DoH in Enterprise Networks

A hands-on guide using dnsmasq to filter SVCB and HTTPS records for disabling ECH and enforcing central DNS policies. Notes that DoH requires separate network-layer policies.

March 31, 2025 · 3 min · 468 words

XML-RPC Security Vulnerabilities Analysis and Mitigation Strategies

Comprehensive analysis of XML-RPC security flaws including RCE, XXE, and DDoS, with mitigation strategies and a Python PoC exploit.

March 28, 2025 · 4 min · 692 words

Review of Citrix Security Policy Effectiveness

Citrix administrators apply security policies to each user’s VDI (Virtual Desktop Infrastructure) through Citrix Group Policy. However, certain structural vulnerabilities in Citrix CSE (Citrix Service Engine) and the Citrix VDI Agent allow for potential bypassing of these security policies.

November 5, 2024 · 3 min · 469 words

KPIs Can Cause Incidents!!!

Real cases where manipulated KPI metrics led to cybersecurity incidents, exposing the dangers of metric-driven security management.

June 20, 2024 · 2 min · 402 words

Common Misconceptions of Security Assessors

Three common misconceptions that weaken security assessments and strategies to build repeatable, effective vulnerability evaluation.

June 16, 2024 · 3 min · 550 words

Can Development Culture Influence Security Levels?

Exploring how development culture shapes code security, with practical examples using static analysis tools like Joern.

May 22, 2024 · 5 min · 952 words

Bypassing citrix policy is not a vulnerability, but it can be a violation of the law

How Citrix VDI policies can be bypassed via registry manipulation—a legal risk analysis with detection and mitigation strategies.

April 27, 2023 · 5 min · 989 words

Strengthening cybersecurity through government ngos and bug bounty programs

How government NGOs and bug bounty programs strengthen cybersecurity, with insights on security taxes and public-private collaboration.

April 18, 2023 · 3 min · 563 words

Security threats and mitigation strategies for java reflection

The Java Reflection API is a powerful tool that allows dynamic manipulation of classes, methods, and interfaces at runtime. However, due to its flexibility, it introduces significant security risks, as attackers can exploit it to gain unauthorized access to systems. In this article, we will explore the security threats posed by Java Reflection and outline strategies to mitigate these risks.

September 3, 2019 · 5 min · 1055 words

About the XSSAudit

Why Google removed XSSAudit from Chrome and what it means for web security—analyzing the shift from XSS filters to CSP.

August 8, 2019 · 2 min · 336 words