Task 1 – Web App Testing and Privilege Escalation In these set of tasks you’ll learn the following: Brute forcing Hash cracking Service enumeration Linux Enumeration The main goal here is to learn as much as possible. Find the services exposed by the machine: Use “nmap” to find out what services are running on theContinue reading “Basic Pentesting”
Tag Archives: informationsecurity
OWASP TOP 10
OWASP stands for Open Web Application Security Project is a non profit organization that works on the improvement of security of software. They publishes report outlining security concerns for web application security focusing on top 10 most critical risks at free of cost. OWASP TOP 10 2017 report as follows: Injection Broken Authentication Sensitive DataContinue reading “OWASP TOP 10”
API Testing
Introduction to API API stands for Application Programming Interface that acts as middle man whose job is deliver the data with the client and server for data exchange. Basically it acts as a medium of communication between two entities. Types of API REST API SOAP API Properties of secure API An API should provide expectedContinue reading “API Testing”
Required Programming Languages
Importance of Programming in cyber security Many people enter in this domain of cyber security thinking it as an escape to programming or coding. But my friend let me tell you when you start writing your own exploits you may be required to know some programming or to find any loophole in the code ofContinue reading “Required Programming Languages”
Linux-1
Linux is an open source operating system made by Linus Torvalds by Linux distribution. Why use Linux? Linux is free on cost, it is an open source platform. Unlike windows linux is highly customizable and secure to use. Basic Commands Echo It is used to display the text or echo the text written after it.Continue reading “Linux-1”
Client Server Architecture
Client server architecture is a distributed architecture that helps to divide workloads between client and server. In the client server architecture, when the client sends the request to server over internet, the server validates the request and responses to that. Advantages All dat in centralized at one place. Cost efficient Data recovery possible. Capacity canContinue reading “Client Server Architecture”
OSI Model
The Open Systems Interconnect model (OSI Model) explains all the individual functions that are necessary for the Internet to work. Physical Layer The Physical layer of the OSI model is responsible for the transfer of bits — the 1’s and 0’s which make up all computer code. Physical Layer is anything that carries 1’s andContinue reading “OSI Model”
Basics of Networking
What is networking? So in simple words networking is an art of connecting devices together so that they can communicate with each other and transmit data. Basic terminologies: Client A client is a hardware device or software that access a service made by the server. Client basically request for services to the server. For example:Continue reading “Basics of Networking”
Prerequisites To Start Ethical Hacking
Skills required to become an Ethical Hacker or Information Security Analyst. Computer Networking Skills General Computing Skills Linux Knowledge Programming Knowledge Database Management Systems(DBMS) Wireless Technology Patience (Most important) Computer Networking Skills Understanding networking concepts and protocols like SSH, FTP, OSI Model, how a packet travels according to OSI model, etc. General Computing Skills ThesesContinue reading “Prerequisites To Start Ethical Hacking”
