top of page
Privilege escalation practical example with mitigations.
In role based applications, a penetration tester should always ensure that he tests for privilege escalation. Let's take an example of a...
Nov 18, 20241 min read
Â
Â
How Would You Monitor and Log Cyber Security Events
Monitoring and Logging Security Events is crucial for understanding and responding to potential security threats. In order to Monitor and...
Nov 18, 20241 min read
Â
Â
Difference between Phishing vs Social Engineering?
Phishing is a trick where scammers send fake messages, often emails, to steal your personal information. In simple terms Phishing is like...
Nov 18, 20242 min read
Â
Â
What is vulnerability management? Explain the process
The vulnerability management process involves the objective to detect and mitigate vulnerabilities in the organization. It can be done...
Nov 18, 20244 min read
Â
Â
What are the authorization test cases?
1. Insecure Direct Object References (IDOR) : Imagine you have a web application where each user has an account page with a unique number...
Nov 18, 20246 min read
Â
Â
How will you test Forgot password functionality ? and what are common issues
Verify that the "Forgot Password" link/button is prominently displayed on the login page. Check that the user is directed to the correct...
Nov 18, 20241 min read
Â
Â
API test Cases and tools for testing API.
To start with testing API, here are the following tools we require to test API: Let’s start with the test cases while also understanding...
Nov 18, 20245 min read
Â
Â
How to install wireshark in windows
A good tutorial on the installation of wireshark can be found below. https://www.youtube.com/watch?v=fpeMCuCKgHA To download Wireshark,...
Nov 18, 20241 min read
Â
Â
How can one setup a demo network? Where are the tools available for the same?
Setting up a demo network using Cisco Packet Tracer is a great way to simulate and practice networking scenarios without the need for...
Nov 18, 20241 min read
Â
Â
What are the common ports and how to remember them?
Your device might be streaming movies, receiving mail, and downloading files simultaneously even though it is connected with one single...
Nov 18, 20242 min read
Â
Â
bottom of page