ChinmayksVULNARABILTY SCANNING.Vulnerability scanning:- Vulnerability scanning is the process of identifying security weaknesses and flaws in systems and software running…Apr 23, 2022Apr 23, 2022
ChinmayksDOS ATTACK WHAT IS DOS?A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS…Apr 9, 2022Apr 9, 2022
ChinmayksIdor and Lfi can be achieved using the webgoat.To open the webgoat, in the browser, use the IP address of OWASPBWA’s IP Address and paste it in the URL.Apr 9, 2022Apr 9, 2022
ChinmayksWeb Application Penetration TestingThe required tool for this testing is BURPSUITE and OWASPBWA Os.Apr 9, 2022Apr 9, 2022
ChinmayksSNIFFINGIt is a process where the attacker will be able to get/find/identify the data of the victim.Apr 9, 2022Apr 9, 2022
ChinmayksNMAP PORT SCANNING.Identifying the ports of the target computer to fetch information about the target computer.Apr 9, 2022Apr 9, 2022
ChinmayksEXPLOITATION OF WINDOWS AND LINUX BASED OPERATING SYSTEM.Initialisation of metasploit is done by #msfdb init .Apr 5, 2022Apr 5, 2022