top of page
Nov 19, 20242 min read
How to intercept traffic from Android apps? Explain with example.
When performing the android pentesting, the penetration tester needs to install the burp suite certificate directly as a system...
8 views
Nov 19, 20243 min read
What is your methodology and approach when testing a web application which is using Wordpress?
Before moving forward with the approach to test a wordpress website, let’s discuss what is a wordpress. So, wordPress is a widely used,...
3 views
Nov 19, 20241 min read
What is the use of the Sequencer tab in Burpsuite?
Burp Sequencer is a sophisticated tool which is used to analyze the quality of randomness of data or tokens, specifically focusing on...
4 views
Nov 19, 20243 min read
What are the common metasploit commands?
Metasploit Framework is one of the most powerful and leading penetration-testing tool written in Ruby, and also one of the biggest...
2 views
Nov 19, 20241 min read
How to install and configure Burpsuite?
For download, visit this link and choose your Operating system: https://portswigger.net/burp/releases/professional-community-2022-8-1?req...
1 view
Nov 19, 20242 min read
What is a WAF? How is it different from Network firewall and what role does WAF play in Cyber security?
WAF: WAF stands for Web Application Firewall. It's a security solution designed to protect web applications by filtering and monitoring...
0 views
Nov 19, 20242 min read
Difference between TCP and UDP and their role in the practical world?
Transmission Control Protocol (TCP) is connection-oriented, which means once a connection has been established, data may be transmitted...
0 views
Nov 19, 20241 min read
What is TCP/IP or TCP 3-Way handshake?
TCP/IP handshake, also called Three Way Handshake, is a process to establish a connection between two devices. It's kind of like when you...
1 view
Nov 19, 20242 min read
What is bind shell and reverse shell? Explain difference between them also explain what are different options in reverse and bind shell
Bind shell and Reverse shell are two different types of hacking techniques in order to gain unauthorized remote access to the compromised...
1 view
Nov 19, 20241 min read
What is LHOST and RHOST ? Explain in detail
LHOST (Local Host): This refers to the attacker's own system, the one from which the attack or exploit is initiated. It specifies the IP...
34 views
bottom of page