top of page
Nov 19, 20242 min read
How to write a report for VAPT / penetration testing exercise? What are the common aspects of a report?
Once we have tested all the test cases and collected evidence, it’s time to prepare the report. The report should fulfill the following...
60 views
Nov 19, 20242 min read
How to intercept traffic from Android apps? Explain with example.
When performing the android pentesting, the penetration tester needs to install the burp suite certificate directly as a system...
8 views
Nov 19, 20243 min read
What is your methodology and approach when testing a web application which is using Wordpress?
Before moving forward with the approach to test a wordpress website, let’s discuss what is a wordpress. So, wordPress is a widely used,...
3 views
Nov 19, 20241 min read
What is the use of the Sequencer tab in Burpsuite?
Burp Sequencer is a sophisticated tool which is used to analyze the quality of randomness of data or tokens, specifically focusing on...
4 views
Nov 19, 20243 min read
What are the common metasploit commands?
Metasploit Framework is one of the most powerful and leading penetration-testing tool written in Ruby, and also one of the biggest...
2 views
Nov 19, 20241 min read
How to install and configure Burpsuite?
For download, visit this link and choose your Operating system: https://portswigger.net/burp/releases/professional-community-2022-8-1?req...
1 view
Nov 19, 20242 min read
How does an organization network diagram look like with all security components deployed?
The network diagram would change from one organization to other, but this is what a general network diagram looks like: Let’s discuss the...
8 views
Nov 19, 20242 min read
What is a WAF? How is it different from Network firewall and what role does WAF play in Cyber security?
WAF: WAF stands for Web Application Firewall. It's a security solution designed to protect web applications by filtering and monitoring...
0 views
Nov 19, 20242 min read
Difference between TCP and UDP and their role in the practical world?
Transmission Control Protocol (TCP) is connection-oriented, which means once a connection has been established, data may be transmitted...
0 views
Nov 19, 20241 min read
What is TCP/IP or TCP 3-Way handshake?
TCP/IP handshake, also called Three Way Handshake, is a process to establish a connection between two devices. It's kind of like when you...
1 view
bottom of page