Quick Overview: Path Traversal Vulnerability
Path Traversal vulnerability is an easy-to-find vulnerability in the web application. In OWASP Top 10 2021, it comes under A1:...
Path Traversal vulnerability is an easy-to-find vulnerability in the web application. In OWASP Top 10 2021, it comes under A1:...
This blog lists interview questions and answers to Trusted Computing. Q. What is Trusted Computing? Ans: Combination of components and...
Quantum cryptography is a buzzword nowadays. We know that conventional cryptography plays a critical role in securing and protecting data...
ISO/IEC 27400 is a newly released comprehensive standard that provides guidelines on risks, principles, and controls for the security and...
Firefox is the first choice for security professionals and bug hunters. This blog lists out some tips to use firefox...
HCL AppScan is a comprehensive security assessment tool for identifying web application threats and vulnerabilities. I have been using this...
If you are involved in web security assessment, the best way is to analyze the HTTP traffic of the website...
Cyber Security is a hot skill and many new graduates are interested in acquiring knowledge related to it. In the...
Windows is the most popular and widely used operating system (OS) worldwide. Most users rely only on Windows to access...
Cryptographic Failures vulnerabilities are at number two in OWASP Top 10 2021. This vulnerability may expose sensitive data available on...
This vulnerability type is at the top of OWASP Top 10 2021. As per OWASP, more than 90% of applications...
Search engines help locate the desired resources on the internet. Hackers are also using different search engines extensively to complete...
CeWL is an awesome Ruby-based tool used by Pentesters to generate a custom wordlist to bombard the target. CeWL is...
LDRA is an automated tool suite to test and verify embedded software for requirements traceability and compliance check against different...