Penetration testing is performed on Win 7, Win Server 2008, Ubuntu form Kali being the […]
XXE Attack using Burpsuite
Steps: ⦁ I used a vulnerable website (⦁ http://testhtml5.vulnweb.com/#/popular) a)Pre-settings to be done b)Go to […]
Fundamentals Of ISO 27001
What is the ISO 27001 standard? The ISO 27001 standard adopts a process approach for […]