top of page
How to write a report for VAPT / penetration testing exercise? What are the common aspects of a report?
Once we have tested all the test cases and collected evidence, it’s time to prepare the report. The report should fulfill the following...
Nov 19, 20242 min read
Â
Â
How to intercept traffic from Android apps? Explain with example.
When performing the android pentesting, the penetration tester needs to install the burp suite certificate directly as a system...
Nov 19, 20242 min read
Â
Â
What is your methodology and approach when testing a web application which is using Wordpress?
Before moving forward with the approach to test a wordpress website, let’s discuss what is a wordpress. So, wordPress is a widely used,...
Nov 19, 20243 min read
Â
Â
What is the use of the Sequencer tab in Burpsuite?
Burp Sequencer is a sophisticated tool which is used to analyze the quality of randomness of data or tokens, specifically focusing on...
Nov 19, 20241 min read
Â
Â
What are the common metasploit commands?
Metasploit Framework is one of the most powerful and leading penetration-testing tool written in Ruby, and also one of the biggest...
Nov 19, 20243 min read
Â
Â
How to install and configure Burpsuite?
For download, visit this link and choose your Operating system: https://portswigger.net/burp/releases/professional-community-2022-8-1?req...
Nov 19, 20241 min read
Â
Â
How does an organization network diagram look like with all security components deployed?
The network diagram would change from one organization to other, but this is what a general network diagram looks like: Let’s discuss the...
Nov 19, 20242 min read
Â
Â
What is a WAF? How is it different from Network firewall and what role does WAF play in Cyber security?
WAF: WAF stands for Web Application Firewall. It's a security solution designed to protect web applications by filtering and monitoring...
Nov 19, 20242 min read
Â
Â
Difference between TCP and UDP and their role in the practical world?
Transmission Control Protocol (TCP) is connection-oriented, which means once a connection has been established, data may be transmitted...
Nov 19, 20242 min read
Â
Â
What is TCP/IP or TCP 3-Way handshake?
TCP/IP handshake, also called Three Way Handshake, is a process to establish a connection between two devices. It's kind of like when you...
Nov 19, 20241 min read
Â
Â
bottom of page