Top 100 web vulnerabilitiesInjection Vulnerabilities: 1. SQL Injection (SQLi) 2. Cross-Site Scripting (XSS) 3. Cross-Site Request Forgery (CSRF) 4. Remote Code…Apr 20Apr 20
Abusing HTTP Hop-by-hop request headersHello Hackers, I’m Vamsi Krishna Orsu, Co-founder and Director of Cysigma [A Cybersecurity Consulting Firm]. In today’s blog, well discuss…Jan 21Jan 21
Bug BountyThis article I will tell you about how I make money from sites that do not have a Bug bounty program, because I think this is very…Jan 20Jan 20
PowerShell For Pentesting NOOBS PART — 1PowerShell is a task automation framework and scripting language developed by Microsoft for managing and automating the administration of…Nov 29, 2023Nov 29, 2023
Strengthening Network Security: A Nessus Vulnerability Scan ExplorationThere are Numerous commercial vulnerability scanners are available in the market, some of which provide a free version for home users…Nov 15, 2023Nov 15, 2023
The Al Cyber Kill ChainBorrowed from military strategy, the “Cyber Kill Chain” is a model representing the steps of a cyber attack This adversary intrusion model…Nov 13, 2023Nov 13, 2023
FFUF: A Powerful Tool for Fuzzing Web ApplicationsWeb directory fuzzing is a method used in cybersecurity to explore and identify hidden or sensitive files and directories on a web server…Nov 9, 2023Nov 9, 2023
Protecting your software’s from Brute Force Attacks & How its PerformedIn the world of cybersecurity, a brute force attack is a type of cyber attack where an attacker tries every possible combination of…Nov 7, 2023Nov 7, 2023