Web Application Security

Case Study – New way to Exploit Java Deserialization Vulnerability

Introduction In this case study, we will not focus on how serialization vulnerabilities and how they work because there are…

6 years ago

What Makes Penetration Testing Impactful – Post Exploitation

As a penetration tester, we often come across this riddle – What Makes Penetration Testing Really Impactful. As per penetration…

7 years ago

Introduction to Secure Software Development Life Cycle

The most effective way to reduce application security risk is to implement a formal development process that includes security best…

8 years ago

How secure is my LinkedIn account ?

LinkedIn is a business-oriented Social networking service. One purpose of the sites is to allow registered users to maintain a…

10 years ago