ChaitraWEB APPLICATION PENETRATION TESTINGThe web application continues to grow and attack against web application increases. Since they get deeply embedded in business activities…Dec 20, 2022Dec 20, 2022
ChaitraWhat is Cybersecurity?Since Internet is the most important inventions of the 21st century more business activities are being automated and an increasing number…Dec 16, 2022Dec 16, 2022
ChaitraCYBER SECURITY ATTACKA threat in cybersecurity is a malicious activity by an individual or organization to corrupt or steal data. Gain access to a network, or…Dec 16, 2022Dec 16, 2022
ChaitraJuice shop.Juice Shop is written in Node.js, Express and Angular. the application are a wide range of security vulnerabilities It can be used in…Dec 16, 2022Dec 16, 2022
ChaitraA7 — Missing Functional Level Access Control — bWAPP1. Directory Traversal — DirectoriesJul 28, 2022Jul 28, 2022
ChaitraA3 Cross-Site Scripting (XSS) — bWAPP1.Cross-Site Scripting — Reflected (GET)Jul 28, 2022Jul 28, 2022
ChaitraA2 — Broken Authentication . & Session Management. — bWAPP1.Broken Authentication — Insecure Login FormsJul 28, 2022Jul 28, 2022
ChaitraBanditThe Bandit is a wargame for beginners at Linux/UNIX environment and are facing problems while learning the real-time use of Linux commands…Jul 27, 2022Jul 27, 2022
ChaitraDVWADamn Vulnerable Web Application, shorter DVWA, is a PHP/MySQL web application that is damn vulnerable. The main goal of this pentesting…Jul 27, 2022Jul 27, 2022