Steps: ⦁ I used a vulnerable website (⦁ http://testhtml5.vulnweb.com/#/popular) a)Pre-settings to be done b)Go to […]
WordPress VAPT And Fixation Techniques
VULNERABILITIES FIXATION TOOL USED FOR SCAN – WPSCAN. PLUGIN USED FOR FIXATION Full path disclosure: […]
Vulnerability Assessment in 3 PHP Frameworks
Vulnerability Assessment in 3 PHP Frameworks PHP is the most widely used server side language […]
Top 10 Web Log Analyzers
Title: Top 10 Web Log Analyzers Scope of article Today’s web hosting data centers are […]
Top 10 Security Vulnerability Scanners
Title: Top 10 Security Vulnerability Scanners Scope of article Gone are the days when a […]
Top 5 Security Assessment Tools
Title: Top 5 Security Assessment Tools While performing a vulnerability scanning against a network, it […]
Top 3 Network Monitoring Tools
Title: Top 3 Networks Monitoring Tools Scope of article In a well managed IT infrastructure, […]
SOC2 Compliance for Startups
SOC 2 FOR SERVICE ORGANISATIONS SOC for Service Organizations reports are designed to help service […]
Securing Xen Virtualization
Title: Securing Xen Virtualization Scope of article The concept of virtualization was created in IT […]
Securing SSH Service
Title: Securing SSH Service Scope of article SSH service is very widely used in the […]