top of page
What is Authentication and Authorization? What's the difference between them?
Authentication is the process of verifying the identity of a user, device, or system. It ensures that the person or entity trying to...
Nov 15, 20241 min read
What are the various free / open source test platforms to practice ethical hacking / penetration testing?
Website Security Testing : PortSwigger Labs, DVWA,BWAPP,OWASP Mutillidae,OWASP Web Goat, OWASP Juice Shop, OWASP Broken Web application...
Nov 15, 20241 min read
What is an ethical hacking / penetration testing job?
Assist organizations in continuously identifying cyber security gaps in their technology infrastructure by conducting hacking exercises...
Nov 15, 20241 min read
How to prepare for an Ethical hacking / Penetration testing career?
There are many practical ways that a college student could learn professional ethical hacking / penetration testing to prepare for a job....
Nov 15, 20241 min read
Are you aware of any recent Hack/vulnerability? If yes then Explain in detail.
On September 15th, Uber confirmed rumors of a major cybersecurity breach. The network of the organization had been significantly...
Nov 13, 20243 min read
What is Stealth scan in NMAP, give the command. Also explain why it is called Stealth?
Stealth Scan is also known as SYN Scan or TCP SYN Scan because it sends only one SYN packet in the TCP Handshake process. This speed of...
Nov 13, 20241 min read
What is NMAP? Why is it used?
Nmap, also known as Network Mapper, is a highly effective and adaptable network scanning tool. Its primary purpose is to explore networks...
Nov 13, 20242 min read
What's the difference between Intruder and Repeater?
Both Intruder and Repeater are tabs in Burp Suite used for testing web applications, but they serve different purposes. Repeater is used...
Nov 13, 20241 min read
Why is the MD5 algorithm considered insecure?
The Message Digest Algorithm, or MD5, is a cryptographic hashing function. It is a part of the Message Digest Algorithm family, created...
Nov 13, 20241 min read
Why are PUT,TRACE and TRACK methods disabled?
To understand why these HTTP methods are disabled, let’s discuss each method and dive deep into it’s working: PUT - In this HTTP method,...
Nov 13, 20242 min read
bottom of page
