Gromit Lab Icon

Gromit's Lab

Protocol Weaknesses Using Real-World Exploits

Protocol Weaknesses Using Real-World Exploits

This post explores real-world vulnerabilities in cryptographic protocols through clear visual breakdowns. From replay attacks and bit-string injection to Heartbleed, each flaw is explained using diagrams and real-world context.

Read more →
A Modern Cryptographic Variant of the Dining Cryptographers Protocol

A Modern Cryptographic Variant of the Dining Cryptographers Protocol

Anonymity meets accountability: A verifiable solution to the Dining Cryptographers Problem using public-key cryptography.

Read more →
Authentication Protocols 101

Authentication Protocols 101

Learn the differences between Aliveness, Mutual Communication, and Data Agreement with illustrated examples and protocol flows.

Read more →
Defending Against Mail Bomb Attacks with KQL & Automation

Defending Against Mail Bomb Attacks with KQL & Automation

A collection of KQL queries, scripts, and automation tips to help detect and mitigate mail bomb attacks in Microsoft 365 environments.

Read more →
Home Lab

Home Lab

Welcome to my home lab environment! This page serves as a documentation hub for my personal home lab setup. Feel free to explore the hardware, software, and configurations that make up my lab.

Read more →