top of page
Nov 13, 20241 min read
What is SSL Handshake? Explain the steps involved in it.
An SSL handshake is a process that happens when a user's web browser connects to a website using the HTTPS protocol. This process...
1 view
Nov 13, 20242 min read
What is the approach for testing a network?
Testing Scope, timeline, and support At the beginning of the Network Security Testing process, the penetration tester understands the...
1 view
Nov 13, 20243 min read
What is the approach for testing a web application?
The approach to test web application is as follows: 1. Application walkthrough and scope of testing: At the beginning of the Web...
2 views
Nov 13, 20241 min read
What is Authentication and Authorization? What's the difference between them?
Authentication is the process of verifying the identity of a user, device, or system. It ensures that the person or entity trying to...
0 views
Nov 13, 20245 min read
OWASP top 10 explained for dummies?
Open Web Application Security Project (OWASP) is a non-profit organization dedicated to address security threats. They address top 10...
9 views
Nov 13, 20241 min read
What is CVE and CWE? What are the differences between them?
CVE (Common Vulnerabilities and Exposures) is a list of unique identifiers for known security vulnerabilities. It provides a standardized...
13 views
Nov 13, 20242 min read
What is XXE and its mitigation?
XXE stands for XML External Entity and before we understand the attack, lets understand what is XML first: XML (eXtensible Markup...
2 views
Nov 13, 20242 min read
What is session hijacking? How can it be achieved?
Before going forward with session hijacking, let's deep dive into what a session is. A session is a unique token which establishes a...
7 views
Nov 13, 20241 min read
What are cookie attributes? Explain HTTP-ONLY and HTTP-Secure.
Cookies are small files that websites store on a user's computer to remember certain information about that user. Cookies can have...
7 views
Nov 13, 20243 min read
What is File Inclusion vulnerability and its types?
File inclusion is a type of vulnerability that can exist in web applications. It occurs when a web application allows a user to include a...
6 views
bottom of page