top of page
What is the approach for testing a network?
Testing Scope, timeline, and support At the beginning of the Network Security Testing process, the penetration tester understands the...
Nov 13, 20242 min read
Â
Â
What is the approach for testing a web application?
The approach to test web application is as follows: 1. Application walkthrough and scope of testing: At the beginning of the Web...
Nov 13, 20243 min read
Â
Â
What is Authentication and Authorization? What's the difference between them?
Authentication is the process of verifying the identity of a user, device, or system. It ensures that the person or entity trying to...
Nov 13, 20241 min read
Â
Â
What is MiTRE framework and why is it important to know?
MITRE ATT&CK Framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The...
Nov 13, 20242 min read
Â
Â
OWASP top 10 explained for dummies?
Open Web Application Security Project (OWASP) is a non-profit organization dedicated to address security threats. They address top 10...
Nov 13, 20245 min read
Â
Â
What is CVE and CWE? What are the differences between them?
CVE (Common Vulnerabilities and Exposures) is a list of unique identifiers for known security vulnerabilities. It provides a standardized...
Nov 13, 20241 min read
Â
Â
What is XXE and its mitigation?
XXE stands for XML External Entity and before we understand the attack, lets understand what is XML first: XML (eXtensible Markup...
Nov 13, 20242 min read
Â
Â
How to create a basic SOC setup and practice lab?
To establish a fundamental Security Operations Center (SOC) practice lab, follow these steps: Begin by downloading and installing...
Nov 13, 20241 min read
Â
Â
What are the various open source SIEM tools that freshers can install and practice?
Wazuh Installation Document - https://documentation.wazuh.com/current/getting-started/index.html OSSEC / OSSEC+ Apache Metron Splunk Free...
Nov 13, 20241 min read
Â
Â
What are EDR solutions?
EDR stands for "Endpoint Detection and Response". EDR solutions are a type of cybersecurity technology that focuses on detecting and...
Nov 13, 20241 min read
Â
Â
bottom of page
