punam guptaAPI-Pentesting(part 1)An API, or Application Programming Interface, is one type of testing where pentester trying to find the vulnerabilities of API with the…Apr 2Apr 2
punam guptaOS Command Injection and the way I’ve solved Portswigger Lab.OS (Operating System) command injection is a type of security vulnerability that occurs when an application allows an attacker to execute…Jan 23Jan 23
punam guptaNmapNmap is the most common and free open-source network security scanner. It is used to discover and collect information about hosts and…Oct 8, 2023Oct 8, 2023
punam gupta“Penetration Testing: The Key to a Strong Cybersecurity Strategy”The fundamental goal of penetration testing is to imitate real-world cyberattacks and exploit gaps in security before malevolent hackers…Oct 2, 2023Oct 2, 2023
punam guptaHow does spyware attack a system?Spyware can penetrate a system via a variety of attack vectors, and its infection methods are frequently hidden in order to prevent…Sep 27, 2023Sep 27, 2023
punam guptaSpywareSpyware is harmful software that enters a user’s computer, collects data from the device and the user, and distributes it to third parties…Sep 22, 2023Sep 22, 2023
punam guptaTHE SECURITY ROLE OF WORDPRESS HOSTINGWordPress hosting providers play a vital role in the security of your WordPress website. They offer a variety of features and services to…Sep 20, 2023Sep 20, 2023
punam guptaLet’s talk about how to secure a WordPress website.WordPress is the most popular content management system (CMS), powering 43.2% of all websites. Unfortunately, its popularity attracts a…Sep 19, 2023Sep 19, 2023
punam guptaAKIRA RANSOMWAREAkira ransomware is a relatively new ransomware operation that was first discovered in March 2023. It is a Windows and Linux ransomware…Sep 5, 2023Sep 5, 2023