LucideusinsecurityresearchWhat is Network Time Protocol? | Gautam PrabhakarIntroduction6 min read·Feb 23, 2019----
LucideusinsecurityresearchRBI: Storage of Payment System Data | Sahil AjitsariaThe regulatory guidelines issued by Reserve Bank of India (RBI) w.r.t. RBI/2017–18/153 — DPSS.CO.OD №785/06.08.005/2017–2018, expects all…3 min read·Feb 23, 2019----
LucideusinsecurityresearchServer Side Request Forgery | Aashna JainDescription Server Side Request Forgery (SSRF) is considered slightly unknown attack, and most people confuse how the attack actually…5 min read·Feb 23, 2019----
LucideusinsecurityresearchBasics of Governance, Risk and Compliance | Rajeev SareenSource: Wikimedia Commons4 min read·Feb 22, 2019----
LucideusinsecurityresearchMultiple Vendor DNS Response Flooding Denial Of Service (CVE-2004–0789) | Clint JosyGeneral Information7 min read·Feb 22, 2019----
LucideusinsecurityresearchSecurity Operations Centre guide for an organization | Akash JainNowadays, Organisations have started the building of a Security Operations Centre with limited resources (time, staff, and budget)…3 min read·Feb 22, 2019--1--1
LucideusinsecurityresearchExploiting Put Method | Asfiya ShaikhSeems like a boring topic? But mind you, its NOT!4 min read·Feb 22, 2019----
LucideusinsecurityresearchInsecure Deserialization | Aditya ChaudharyHuh, well this sounds like fun. Let’s see if it’s really that fun…4 min read·Feb 22, 2019----
LucideusinsecurityresearchBuffer Overflow -BRAINPAN | Riha MaheshwariHi Techmates! Brainpan is a vulnerable virtual machine which is designed for people who are preparing for OSCP or wants to exploit buffer…7 min read·Feb 22, 2019----
LucideusinsecurityresearchUnvalidated Redirects and Forwards (Open Redirects) | Asfiya ShaikhLet’s understand how Open redirect vulnerability can be found, attacked and re-mediated.5 min read·Feb 22, 2019----