top of page
How to write a report for VAPT / penetration testing exercise? What are the common aspects of a report?
Once we have tested all the test cases and collected evidence, it’s time to prepare the report. The report should fulfill the following...
Nov 19, 20242 min read
84 views
How to intercept traffic from Android apps? Explain with example.
When performing the android pentesting, the penetration tester needs to install the burp suite certificate directly as a system...
Nov 19, 20242 min read
9 views
What is your methodology and approach when testing a web application which is using Wordpress?
Before moving forward with the approach to test a wordpress website, let’s discuss what is a wordpress. So, wordPress is a widely used,...
Nov 19, 20243 min read
3 views
What is the use of the Sequencer tab in Burpsuite?
Burp Sequencer is a sophisticated tool which is used to analyze the quality of randomness of data or tokens, specifically focusing on...
Nov 19, 20241 min read
5 views
What are the common metasploit commands?
Metasploit Framework is one of the most powerful and leading penetration-testing tool written in Ruby, and also one of the biggest...
Nov 19, 20243 min read
8 views
How to install and configure Burpsuite?
For download, visit this link and choose your Operating system: https://portswigger.net/burp/releases/professional-community-2022-8-1?req...
Nov 19, 20241 min read
4 views
How does an organization network diagram look like with all security components deployed?
The network diagram would change from one organization to other, but this is what a general network diagram looks like: Let’s discuss the...
Nov 19, 20242 min read
9 views
What is a WAF? How is it different from Network firewall and what role does WAF play in Cyber security?
WAF: WAF stands for Web Application Firewall. It's a security solution designed to protect web applications by filtering and monitoring...
Nov 19, 20242 min read
0 views
Difference between TCP and UDP and their role in the practical world?
Transmission Control Protocol (TCP) is connection-oriented, which means once a connection has been established, data may be transmitted...
Nov 19, 20242 min read
1 view
What is TCP/IP or TCP 3-Way handshake?
TCP/IP handshake, also called Three Way Handshake, is a process to establish a connection between two devices. It's kind of like when you...
Nov 19, 20241 min read
1 view
bottom of page