kalpblogger

CRLF Injection

Before going into details on what and how to find and perform CRLF injection and what are the measure one…

5 years ago

AWS Pentesting – Part – 1

Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more…

5 years ago

MALWARE ANALYSIS – PART 2 (SETTING UP THE LAB)

In the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and…

5 years ago

HTTP Parameter Pollution

The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to…

5 years ago

Communication Protocol – WebSocket Overview

What is a WebSocket? WebSocket is a Client-Server Bidirectional Communication protocol initiated over HTTP. WebSockets are used where there is…

5 years ago

Introduction to Information Security Management System (ISMS)

What is an Information Security Management System ? An Information Security Management System (ISMS) is a set of policies and…

5 years ago

HTTP Request Smuggling

What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one…

5 years ago

Risk Management

Every organization conducts risk assessment and mitigation in order to identify risks and minimize their impact via risk mitigation. However,…

5 years ago

Misconfigured Cross-Origin Resource Sharing (CORS) Risk

The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between…

5 years ago

Database Configuration Audit for Security and Compliance [Part-1]

Database Configuration Audit is the latest buzz word everyone is talking about and every organization wants to revamp their databases…

5 years ago