Published insecurityresearchWhat is Network Time Protocol? | Gautam PrabhakarIntroductionFeb 23, 2019Feb 23, 2019
Published insecurityresearchRBI: Storage of Payment System Data | Sahil AjitsariaThe regulatory guidelines issued by Reserve Bank of India (RBI) w.r.t. RBI/2017–18/153 — DPSS.CO.OD №785/06.08.005/2017–2018, expects all…Feb 23, 2019Feb 23, 2019
Published insecurityresearchServer Side Request Forgery | Aashna JainDescription Server Side Request Forgery (SSRF) is considered slightly unknown attack, and most people confuse how the attack actually…Feb 23, 2019Feb 23, 2019
Published insecurityresearchBasics of Governance, Risk and Compliance | Rajeev SareenSource: Wikimedia CommonsFeb 22, 2019Feb 22, 2019
Published insecurityresearchMultiple Vendor DNS Response Flooding Denial Of Service (CVE-2004–0789) | Clint JosyGeneral InformationFeb 22, 2019Feb 22, 2019
Published insecurityresearchSecurity Operations Centre guide for an organization | Akash JainNowadays, Organisations have started the building of a Security Operations Centre with limited resources (time, staff, and budget)…Feb 22, 20191Feb 22, 20191
Published insecurityresearchExploiting Put Method | Asfiya ShaikhSeems like a boring topic? But mind you, its NOT!Feb 22, 2019Feb 22, 2019
Published insecurityresearchInsecure Deserialization | Aditya ChaudharyHuh, well this sounds like fun. Let’s see if it’s really that fun…Feb 22, 2019Feb 22, 2019
Published insecurityresearchBuffer Overflow -BRAINPAN | Riha MaheshwariHi Techmates! Brainpan is a vulnerable virtual machine which is designed for people who are preparing for OSCP or wants to exploit buffer…Feb 22, 2019Feb 22, 2019
Published insecurityresearchUnvalidated Redirects and Forwards (Open Redirects) | Asfiya ShaikhLet’s understand how Open redirect vulnerability can be found, attacked and re-mediated.Feb 22, 2019Feb 22, 2019