top of page
Nov 19, 20242 min read
How to write a report for VAPT / penetration testing exercise? What are the common aspects of a report?
Once we have tested all the test cases and collected evidence, it’s time to prepare the report. The report should fulfill the following...
60 views
Nov 19, 20241 min read
How to install and configure Burpsuite?
For download, visit this link and choose your Operating system: https://portswigger.net/burp/releases/professional-community-2022-8-1?req...
1 view
Nov 19, 20242 min read
How does an organization network diagram look like with all security components deployed?
The network diagram would change from one organization to other, but this is what a general network diagram looks like: Let’s discuss the...
8 views
Nov 19, 20242 min read
What is a WAF? How is it different from Network firewall and what role does WAF play in Cyber security?
WAF: WAF stands for Web Application Firewall. It's a security solution designed to protect web applications by filtering and monitoring...
0 views
Nov 19, 20242 min read
Difference between TCP and UDP and their role in the practical world?
Transmission Control Protocol (TCP) is connection-oriented, which means once a connection has been established, data may be transmitted...
0 views
Nov 19, 20241 min read
What is TCP/IP or TCP 3-Way handshake?
TCP/IP handshake, also called Three Way Handshake, is a process to establish a connection between two devices. It's kind of like when you...
1 view
Nov 19, 20242 min read
What is Red teaming? Explain in detail with an example
The term “Red Team” refers to the group that pretends to be an enemy. In the cyber security context, the red team refers to the group of...
5 views
Nov 19, 20243 min read
Steps involved in configuration review, Some of the weaknesses you found in configuration reviews.
There are two approaches we can follow while performing configuration review: Automated Approach using Nessus: 1. Tool Configuration:...
6 views
Nov 19, 20242 min read
What is SSL handshake (for dummies) and how does it help in security https?
The SSL handshake is the negotiation between the two parties or can say that the communication between the client (web browser) and the...
1 view
Nov 19, 20243 min read
OSI model explained in simple terms
OSI or Open-System Interconnection Model is a reference model which describes seven layers that computer systems use to communicate over...
6 views
bottom of page