XXE Attack using Burpsuite

Steps: ⦁ I used a vulnerable website (⦁ http://testhtml5.vulnweb.com/#/popular) a)Pre-settings to be done b)Go to the vulnerable website: c) Do Forget password: ⦁ I have…

Android Security Risks

Scope of article Open source world loves Android operating system. It is surely a gift from google, that provides cutting edge and versatile mobile development…

How To Pentest Firewall

How to pen test a firewall externally Firewall is a device or software which is responsible for filtering traffic of network. It can be implemented…

Wireless Security Devices Compliance

RCIE Course Modules: 3.9 Wireless Security Devices Compliance What are wireless security protocols? Wired Equivalent Privacy (WEP), (WPA) Wi-Fi Protected Access, Wi-Fi Protected Access 2…

Vulnerabilities Framework Latest

Vulnerabilities in Ruby-on-Rails Framework & How to prevent it: Ruby-on-rails—it’s modular, easy-to-read, and broadly supported by legions of loyal developers. Many of the world’s most…

Vulnerabilities in Ruby

Vulnerabilities in Ruby-on-Rails Framework & How to prevent it: Ruby-on-rails—it’s modular, easy-to-read, and broadly supported by legions of loyal developers. Many of the world’s most…