top of page
Steps involved in configuration review, Some of the weaknesses you found in configuration reviews.
There are two approaches we can follow while performing configuration review: Automated Approach using Nessus: 1. Tool Configuration:...
Nov 19, 20243 min read
Â
Â
What is SSL handshake (for dummies) and how does it help in security https?
The SSL handshake is the negotiation between the two parties or can say that the communication between the client (web browser) and the...
Nov 19, 20242 min read
Â
Â
OSI model explained in simple terms
OSI or Open-System Interconnection Model is a reference model which describes seven layers that computer systems use to communicate over...
Nov 19, 20243 min read
Â
Â
What are ports?
In a computer science or network a port can be defined as both physical and logical. A port acts like a door through which data can flow...
Nov 19, 20242 min read
Â
Â
Why Burpsuite is able to capture https traffic?
Burpsuite is an integrated, user-interface proxy tool which is used to perform security testing of web applications or websites. It is...
Nov 19, 20241 min read
Â
Â
Owasp Top 10 2017 vs 2021
The Open Web Application Security Project or OWASP is an international non-profit organization that produces freely available articles,...
Nov 19, 20242 min read
Â
Â
All NMAP commands and why they are used?
The following are the fundamental nmap commands and their purpose as follows: Basic scan techniques: Scan name and their purpose NMAP...
Nov 19, 20242 min read
Â
Â
What are the different types of JSON web token attacks?
JSON Web Tokens (JWTs) are widely used for authentication and authorization in web applications. However, like any technology, they can...
Nov 19, 20243 min read
Â
Â
How to perform reconnaissance on a web application? Explain the methodology of tools you use to perform reconnaissance?
Reconnaissance is one of the most important steps in web application penetration testing as this step gives us a good idea about the...
Nov 19, 20243 min read
Â
Â
Â
What are the meanings of vulnerability, risk, threat, likelihood, impact and why do Cyber security experts need to know this and where are these applied?
Vulnerability, risk, threat, likelihood, and impact are crucial concepts that help experts understand, assess, and mitigate potential...
Nov 19, 20242 min read
Â
Â
bottom of page
