Nassec.ioCyber Security | Questions and AnswersPeople are more curious and excited than ever before to learn about cyber security and information technology. When it comes to cyber…Apr 1, 2021Apr 1, 2021
Nassec.ioWhy do I hate Bug Bounty?Hi! I am Niraj Khatiwada a.k.a nerrorsec. I used to be a bug bounty hunter. Now, I am a security researcher at Nassec. I had been actively…Nov 19, 20202Nov 19, 20202
Baibhav AnandHow often do we overlook vulnerabilities?Hello Readers, 7/10 vulnerabilities are often overlooked by hackers. I don’t know if that’s true, I just made that up. Anyway, This…Sep 9, 20201Sep 9, 20201
SecureIcaWhat are Web Cache Poisoning and ways you can prevent itBefore starting on what web cache poisoning is all about and how it is done. Let us first dive into what exactly is web cache and how does…Jul 12, 2020Jul 12, 2020
SecureIcaTargetting User Accounts and websites with Forgot Password.Are login pages the only the way to enter our sites?Aug 13, 2020Aug 13, 2020
SecureIcaPenetration Testing Checklist I: How much load can your site handle?If all the functions are working right, the application can be considered as Quality Product right? Wrong!Aug 7, 2020Aug 7, 2020
SecureIcaGuidance to Cross-Site Scripting for beginners- I: Reflected XSSBefore diving into how XSS could be injected or even before starting with anything, let us first explore a little bit of its definition…Jun 30, 20201Jun 30, 20201
SecureIcaDemystifying some myths of Hackers and Data BreachesWe almost get fascinated by Hollywood. We often see how unique the circumstances they show behind the hacking and we tend to believe that…Jul 8, 2020Jul 8, 2020
SecureIcaImportance of Secure Coding with it’s best practices.Before we explore the role of secure coding in the development phase. Let us first dive into what is secure coding first and then move…Jul 20, 2020Jul 20, 2020