Fazil khan's InsightsUnveiling the Nahk Security Engineer: ChatGPTWelcome to the world of Nahk Security Engineer, where cybersecurity meets clarity in communication. This blog delves into the comprehensive…Nov 11, 2023Nov 11, 2023
Fazil khan's InsightsFingerprint Web Server: Discovering Server Details & Enhancing SecurityIntroduction:Sep 16, 2023Sep 16, 2023
Fazil khan's InsightsConduct Search Engine Discovery/Reconnaissance for Information LeakageIntroduction:Sep 16, 2023Sep 16, 2023
Fazil khan's InsightsThe Power of Burp Spider for Automated Website Mapping in Web Application SecurityIntroduction:Jul 23, 2023Jul 23, 2023
Fazil khan's InsightsWebsite Mapping and Scoping with Burp Suite: A Step-by-Step Web Application Security TutorialIntroduction:Jul 23, 2023Jul 23, 2023
Fazil khan's InsightsSecure Communication: Configuring Firefox and Adding CertificatesIn today’s digital age, security is of utmost importance, especially when it comes to web communication. HTTP, while essential for…Jul 23, 2023Jul 23, 2023
Fazil khan's InsightsHTTP Request and Response Headers: A Comprehensive TutorialIntroduction:Jul 23, 2023Jul 23, 2023
Fazil khan's InsightsIdentifying Business Logic Flaws: A Comprehensive ApproachAs technology continues to advance, the importance of securing applications cannot be overstated. While traditional security measures focus…Jul 20, 2023Jul 20, 2023
Fazil khan's InsightsComprehensive Guide to iOS Penetration Testing: A Step-by-Step ApproachPenetration testing, also known as ethical hacking, is a critical process to identify and address security vulnerabilities, ensuring a…Jul 19, 2023Jul 19, 2023