Tech Articles

Penetration Testing Resources – 2018 Compilation

A Penetration test is the process of actively evaluating company’s information security measures. Security measures are actively analyzed for design weakness, technical flaws and vulnerabilities. The results are delivered comprehensively in a report, to executive, management, and technical audiences. An organisation should conduct a risk assessment operation before the penetration testing that will help to […]

Tutorials

SQL Injection – A Complete Understanding Tutorial

SQL injection is an attack to circumvent scripts using SQL queries, as is often the case on websites, and especially for user authentication systems. [#] Introduction – SQL, or Structured Query Language, is a Standard and standardized computer pseudo-language, intended to interrogate or manipulate a relational database – Wikipedia. Today, with the development of dynamic […]

Tech Articles

Top 5 Vulnerability Research Websites – #CyberSecurity

1) National Vulnerability Database https://nvd.nist.gov/ NVD i.e. National Vulnerability Database is a product of NIST (National Institute of Standards and Technology) Computer Security Division which is sponsored by DHS(Dept. of Homeland Security’s). The NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data […]

Tech Articles

OWASP Top 10 – RC2 Final Released [A4, A8 and A10] Added

The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. All the OWASP tools, documents, videos and presentations and chapters are free and open to anyone interested in improving application security. The rapid pace of modern software development […]

Tech Articles

OWASP Top 10 – 2017 is out and yet to release soon for public

OWASP means The Open Web Application Security Project is a worldwide free and open community focused on improving the security of application software. Their mission is to make application security “Visible” so that people and organizations can make informed decisions about their risks. OWASP is a non-profit chartiable organization that ensures the ongoing availability and […]

Tech Articles

About NMAP – Network Mapper

NMAP (Network Mapper) is a security scanner mainly developed for LINUX platforms but later on ported to Windows, Solaris and BSD Variants. This tool is used to discover hosts and services on a computer network. NMAP Author – Gordon Lyon Download Link  – Click Here This software provides numerous no. of features as listed below […]