LucideusinsecurityresearchWhat is Network Time Protocol? | Gautam PrabhakarIntroductionFeb 23, 2019Feb 23, 2019
LucideusinsecurityresearchRBI: Storage of Payment System Data | Sahil AjitsariaThe regulatory guidelines issued by Reserve Bank of India (RBI) w.r.t. RBI/2017–18/153 — DPSS.CO.OD №785/06.08.005/2017–2018, expects all…Feb 23, 2019Feb 23, 2019
LucideusinsecurityresearchServer Side Request Forgery | Aashna JainDescription Server Side Request Forgery (SSRF) is considered slightly unknown attack, and most people confuse how the attack actually…Feb 23, 2019Feb 23, 2019
LucideusinsecurityresearchBasics of Governance, Risk and Compliance | Rajeev SareenSource: Wikimedia CommonsFeb 22, 2019Feb 22, 2019
LucideusinsecurityresearchMultiple Vendor DNS Response Flooding Denial Of Service (CVE-2004–0789) | Clint JosyGeneral InformationFeb 22, 2019Feb 22, 2019
LucideusinsecurityresearchSecurity Operations Centre guide for an organization | Akash JainNowadays, Organisations have started the building of a Security Operations Centre with limited resources (time, staff, and budget)…Feb 22, 20191Feb 22, 20191
LucideusinsecurityresearchExploiting Put Method | Asfiya ShaikhSeems like a boring topic? But mind you, its NOT!Feb 22, 2019Feb 22, 2019
LucideusinsecurityresearchInsecure Deserialization | Aditya ChaudharyHuh, well this sounds like fun. Let’s see if it’s really that fun…Feb 22, 2019Feb 22, 2019
LucideusinsecurityresearchBuffer Overflow -BRAINPAN | Riha MaheshwariHi Techmates! Brainpan is a vulnerable virtual machine which is designed for people who are preparing for OSCP or wants to exploit buffer…Feb 22, 2019Feb 22, 2019
LucideusinsecurityresearchUnvalidated Redirects and Forwards (Open Redirects) | Asfiya ShaikhLet’s understand how Open redirect vulnerability can be found, attacked and re-mediated.Feb 22, 2019Feb 22, 2019