Hiruni DahanayakeinBug ZeroFrom Retina Scans to Fingerprint Recognition: A Deep Dive into the World of Biometric SecurityThe next step in security beyond passwords is biometrics. We are already well into integrating this realm of cyber security, with…Feb 22Feb 22
Hiruni DahanayakeinBug ZeroAuthenticating third-party services using OAuth 2.0Open Authorization, or OAuth, is an open standard authorization framework. However, there are some discrepancies regarding this statement…Mar 13, 2023Mar 13, 2023
Hiruni DahanayakeinBug ZeroIntercept HTTP Requests With Burp ProxyIntercepting a request means halting the request before it completes the round-trip to the server and back.Dec 7, 2022Dec 7, 2022
Hiruni DahanayakeinUCSC ISACA Student GroupIntercept HTTP requests with Burp ProxyIntercepting a request means halting the request before it completes the round-trip to the server and back. Instead, the user can inspect…Nov 13, 2022Nov 13, 2022
Hiruni DahanayakeinBug ZeroCookies Aren’t All That BadInternet cookies have gained notoriety as trackers, being compared to spies observing your every move on the web.Sep 15, 2022Sep 15, 2022
Hiruni DahanayakeinUCSC ISACA Student GroupCookies aren’t all that badInternet cookies have gained notoriety as trackers, being compared to spies observing your every move on the web. While the primary purpose…Sep 3, 2022Sep 3, 2022
Hiruni DahanayakeUsing Lite Server to view changes to source code in real-timeTranslating a UI design to a functional webpage, consists of constantly saving changes made to HTML/ CSS/ Javascript files and then…Apr 7, 2022Apr 7, 2022