Homepage
Open in app
Sign in
Get started
CYSCOM VITCC
Think Before You Click!
About
CYSCOM VIT Website
Follow
BIRTHDAY ATTACK
BIRTHDAY ATTACK
A Birthday Attack is a cryptographic attack which exploits the possibility of hash collisions to hijack secure connections.
Hemang Ahuja
Aug 16, 2021
PASSWORD CRACKING WITH HYDRA — PART 1
PASSWORD CRACKING WITH HYDRA — PART 1
Hey, readers!
Laksha
Jun 7, 2021
TryHackMe Walkthrough | LOCKDOWN
TryHackMe Walkthrough | LOCKDOWN
This is a CTF walkthrough of THM machine Lockdown. It’s a medium difficulty challenge.
Tanmay Deshpande
Oct 15, 2021
Docker breakout: Mounted docker socket
Docker breakout: Mounted docker socket
As we all know dockers are pretty much in use everywhere now, so it's essential to make sure containers are secure. I have been playing…
Kindawingingit
Nov 22, 2021
FUZZING: Automating Bug Detection
FUZZING: Automating Bug Detection
Sometimes hacking isn’t about taking a program apart: It’s about throwing random objects at it to see what breaks.
Tanmay Deshpande
Sep 27, 2021
ZERO TRUST ARCHITECTURE
ZERO TRUST ARCHITECTURE
IoT devices being integrated into IT networks is extremely common nowadays. This integration of IoT devices brings with it its own set of…
Pranav Viswanathan
Sep 20, 2021
How HTTPS Works
How HTTPS Works
A brief explanation about HTTPS, how it works and why it is needed
Vishal N
Aug 11, 2021
MEAN Stack vs MERN Stack — Which one to choose and Why?
MEAN Stack vs MERN Stack — Which one to choose and Why?
Whether you are a student or an IT developer, choosing the right stack matters a lot. But we will get to that later first let’s understand…
Joyeeta Dey
Aug 4, 2021
Understanding How React.js Works Under the Hood
Understanding How React.js Works Under the Hood
React is one of the most popular JavaScript libraries. A lot of startups and big corporations choose React for building fast front-end side…
Himanshu Barak
Jul 28, 2021
Web Vulnerabilities: Part 4— Java
Web Vulnerabilities: Part 4— Java
Web Enthusiasts and Developers welcome to the fourth and final part of our blog series on Web Vulnerabilities and how to secure them, and…
Ayyappan K M
Jul 21, 2021
Web Vulnerabilities: Part 3 — PHP
Web Vulnerabilities: Part 3 — PHP
Cyber Security Enthusiasts, welcome to the third part of this exclusive blog series exploring different web vulnerabilities and ways to…
Neh Joshi
Jul 14, 2021
Web Vulnerabilities: Part 2 - Django
Web Vulnerabilities: Part 2 - Django
Hello Developers and Web Enthusiasts, welcome to the second part of our 4 part blog series on Web Vulnerabilities, and this time around we…
Ayyappan K M
Jul 7, 2021
Web Vulnerabilities: Part 1 — Node.js
Web Vulnerabilities: Part 1 — Node.js
Developers and Web Enthusiasts, welcome to this four-part blog series on Web Vulnerabilities and how to secure them! We’ll be exploring…
Neh Joshi
Jun 30, 2021
PASSWORD CRACKING WITH HYDRA — PART 2
PASSWORD CRACKING WITH HYDRA — PART 2
Hey readers!
Laksha
Jun 14, 2021
How OWASP VITCC is building the communities of Tomorrow
How OWASP VITCC is building the communities of Tomorrow
“We are the middle children of history, man. No purpose or place.” — Tyler Durden, Fight Club
Apratim Shukla
Jun 11, 2021
Intro to x86–64: TryHackMe Room Walkthrough
Intro to x86–64: TryHackMe Room Walkthrough
Today we are going to solve a beginner-friendly TryHackMe room for reverse engineering. Reverse engineering is a process or method through…
Kindawingingit
May 31, 2021
OWASP VITCC
OWASP VITCC
Hello, readers! Welcome to OWASP VITCC official Medium page.
SPARSH RAJ
May 17, 2021
About CYSCOM VITCC
Latest Stories
Archive
About Medium
Terms
Privacy
Teams