Dhananjay TupeCi-Cd With Ansible — DevSecOps Petshop projectYou can find GitHub Repository from here :Dec 9, 2023Dec 9, 2023
Dhananjay TupeDevSecOps : Netflix Clone CI-CD with Monitoring | Email | Part-2Hello friends, we will be deploying a Netflix clone. We will be using Jenkins as a CICD tool and deploying our application on a Docker…Dec 5, 2023Dec 5, 2023
Dhananjay TupeDevSecOps : Netflix Clone CI-CD with Monitoring | Email | Part-1Hello friends, we will be deploying a Netflix clone. We will be using Jenkins as a CICD tool and deploying our application on a Docker…Dec 5, 2023Dec 5, 2023
Dhananjay TupeExploring OWASP Juice ShopCybersecurity is an ever-evolving field, and staying ahead of threats is essential. One way to do this is by testing your web applications…Sep 29, 2023Sep 29, 2023
Dhananjay TupeCross-Site Request Forgery (CSRF): Mitigating a Persistent ThreatIntroduction :Sep 27, 2023Sep 27, 2023
Dhananjay TupePort Knocking: An Extra Layer of Security for Network ServicesIntroduction:Sep 26, 2023Sep 26, 2023
Dhananjay TupeAuthentication vulnerabilitiesAuthentication vulnerabilities can allow attackers to gain access to sensitive data and functionality. They also expose additional attack…Sep 21, 2023Sep 21, 2023
Dhananjay TupeUnderstanding Host Header AttacksHost Header Attacks occur when attackers manipulate the Host HTTP header in a web request to exploit vulnerabilities in web applications…Sep 15, 2023Sep 15, 2023
Dhananjay TupeFUFF and SecLists :Cybersecurity is a field that has gained a lot of attention in recent years, and for a good reason. With the increase in cyber threats, it…Apr 17, 2023Apr 17, 2023