Vulnerabilities in Ruby-on-Rails Framework & How to prevent it: Ruby-on-rails—it’s modular, easy-to-read, and broadly supported by legions of loyal developers. Many of the world’s most…
VAPT
Vulnerabilities in Ruby
Vulnerabilities in Ruby-on-Rails Framework & How to prevent it: Ruby-on-rails—it’s modular, easy-to-read, and broadly supported by legions of loyal developers. Many of the world’s most…
Vulnerabilities in play Framework
Vulnerabilities in play Framework Http only cookie bypass CVE-2015-2156 Description A vulnerability has been found in Play’s cookie handling code that could allow an attacker…
Vulnerabilities in meteor framework
Vulnerabilities in meteor framework Meteor, or MeteorJS, is a free and open source isomorphic JavaScript web framework written using Node.js. Meteor allows for rapid prototyping and produces…
Vulnerabilities in Angular js Framework
Vulnerabilities in angular js framework What is angularjs ? Angular JS is a framework by Google (originally developed by Misko Hevery and Adam Abrons) which…
Securing Email Servers Compliance
RCIE Course Modules: 3.10 Securing Email Servers Compliance What is email server security compliance? Securing your corporate email server is one of the most important…
Penetration-TestingDJango Framework
DJango Framework: – INTRODUCTION: – Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Worked by experienced developers,it deals…
Fundamentals Of Security Headers
The notorious targets for all sorts of cyber attacks can be zeroed down to the web applications. The increasing pattern of cyber attacks has led…
Ethical Hacking Information Gathering
INFORMATION GATHERING ( REDHAWK ) USING KALI Basic Reconnaisance: GEO-IP LOOKING GRAB BANNERS: DNS LOOKUP: SUBNET CALCULATOR: NMAP PORT SCANNING: SUBDOMAIN: