OWASP Top 10 MCQ with Answers
OWASP is a non-profit organization that publishes the Top 10 categories of vulnerability types of web applications. This blog lists...
OWASP is a non-profit organization that publishes the Top 10 categories of vulnerability types of web applications. This blog lists...
Firmware Analysis and Comparison Tool (FACT) is an automation toolkit to analyze binaries of IoT devices, network devices, drones, UEFI,...
readelf command is used to analyze binaries based on Linux. This is most common tool used by security professionals to...
Whenever you engage in the security assessment of Windows-based targets, password cracking is one of the activities that need to...
A month ago I was listening to a podcast where they used the term ‘Metaverse’. Although I have listened to...
Executable and Linkable Format (ELF) is a default format on Linux-based systems. It defines the structure of binary files used...
This blog comes in the form of a web story that illustrates the Top 15 NMap Commands used by Security...
Log4j vulnerability (also called Log4shell) is a critical issue that has been discovered in popular logging package 4j on 9th...
The File system is used to control how data is stored and retrieved. Each file served a specific purpose. Remember...
This blog lists out Side-Channel Attack Interview Questions that may be asked in job interviews. A side-channel attack is still...
First, we understand what is DNS. DNS, short for Domain Name System, is a protocol that acts as a directory...
Angr is a python framework that can be used in the security assessment of binaries. This framework basically used for...
This blog guides you in changing the password if you have forgotten your Kali Linux password. Or you are too...
According to one study, IoT Devices are the most vulnerable devices among all IT-enabled devices. As more and more IoT...