top of page
Nov 19, 20243 min read
Steps involved in configuration review, Some of the weaknesses you found in configuration reviews.
There are two approaches we can follow while performing configuration review: Automated Approach using Nessus: 1. Tool Configuration:...
6 views
Nov 19, 20242 min read
What is SSL handshake (for dummies) and how does it help in security https?
The SSL handshake is the negotiation between the two parties or can say that the communication between the client (web browser) and the...
1 view
Nov 19, 20243 min read
OSI model explained in simple terms
OSI or Open-System Interconnection Model is a reference model which describes seven layers that computer systems use to communicate over...
6 views
Nov 19, 20242 min read
What are ports?
In a computer science or network a port can be defined as both physical and logical. A port acts like a door through which data can flow...
0 views
Nov 19, 20241 min read
Why Burpsuite is able to capture https traffic?
Burpsuite is an integrated, user-interface proxy tool which is used to perform security testing of web applications or websites. It is...
15 views
Nov 19, 20242 min read
Owasp Top 10 2017 vs 2021
The Open Web Application Security Project or OWASP is an international non-profit organization that produces freely available articles,...
2 views
Nov 19, 20242 min read
All NMAP commands and why they are used?
The following are the fundamental nmap commands and their purpose as follows: Basic scan techniques: Scan name and their purpose NMAP...
16 views
Nov 19, 20243 min read
What are the different types of JSON web token attacks?
JSON Web Tokens (JWTs) are widely used for authentication and authorization in web applications. However, like any technology, they can...
1 view
Nov 19, 20243 min read
How to perform reconnaissance on a web application? Explain the methodology of tools you use to perform reconnaissance?
Reconnaissance is one of the most important steps in web application penetration testing as this step gives us a good idea about the...
6 views
Nov 19, 20242 min read
What are the meanings of vulnerability, risk, threat, likelihood, impact and why do Cyber security experts need to know this and where are these applied?
Vulnerability, risk, threat, likelihood, and impact are crucial concepts that help experts understand, assess, and mitigate potential...
33 views
bottom of page