top of page
What is SSL Handshake? Explain the steps involved in it.
An SSL handshake is a process that happens when a user's web browser connects to a website using the HTTPS protocol. This process...
Nov 13, 20241 min read
Â
Â
What is the approach for testing a network?
Testing Scope, timeline, and support At the beginning of the Network Security Testing process, the penetration tester understands the...
Nov 13, 20242 min read
Â
Â
What is the approach for testing a web application?
The approach to test web application is as follows: 1. Application walkthrough and scope of testing: At the beginning of the Web...
Nov 13, 20243 min read
Â
Â
What is Authentication and Authorization? What's the difference between them?
Authentication is the process of verifying the identity of a user, device, or system. It ensures that the person or entity trying to...
Nov 13, 20241 min read
Â
Â
OWASP top 10 explained for dummies?
Open Web Application Security Project (OWASP) is a non-profit organization dedicated to address security threats. They address top 10...
Nov 13, 20245 min read
Â
Â
What is CVE and CWE? What are the differences between them?
CVE (Common Vulnerabilities and Exposures) is a list of unique identifiers for known security vulnerabilities. It provides a standardized...
Nov 13, 20241 min read
Â
Â
What is XXE and its mitigation?
XXE stands for XML External Entity and before we understand the attack, lets understand what is XML first: XML (eXtensible Markup...
Nov 13, 20242 min read
Â
Â
What is session hijacking? How can it be achieved?
Before going forward with session hijacking, let's deep dive into what a session is. A session is a unique token which establishes a...
Nov 13, 20242 min read
Â
Â
What are cookie attributes? Explain HTTP-ONLY and HTTP-Secure.
Cookies are small files that websites store on a user's computer to remember certain information about that user. Cookies can have...
Nov 13, 20241 min read
Â
Â
What is File Inclusion vulnerability and its types?
File inclusion is a type of vulnerability that can exist in web applications. It occurs when a web application allows a user to include a...
Nov 13, 20243 min read
Â
Â
bottom of page
