prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 20, 2023Basic pen-testing vulnhub machine 2 HackingBy Prabhudarshan Samal This article is about a well-illustrated write-up based on hacking activities in an educational temperament and non-abusive intent. The techniques and resources provided by the article are totally intended for educational purpo...Discusspentesting
prabhudarshan samalcybercruxprabhu.hashnode.dev·Dec 17, 2023Cross-site scripting(XSS) RemediationApplications of cross-site scripting:- An attacker that uses a cross-site scripting flaw can usually do the following: Assume the identity of the victim user. Execute every action that the user is capable of. Read any data that the user has permissio...DiscussWAPT
Ashutosh Wahaneblog.ashutoshwahane.dev·Oct 1, 2023Shielding Your Android AppHi Guys! Do you recall learning in biology class about cells being the fundamental unit of life, with both structural and functional properties? Well, in today's world, mobile phones have become just as essential and fundamental to our daily lives. H...Discuss·4 likes·202 readsAndroid
BinFin Techbinfintech.hashnode.dev·Sep 22, 2023Introduction to Computer Networking1) What is computer networking? Computer Networking is referred to as the process of connecting various computing systems and devices so they may communicate with one another. 2) What are the different types of connections in computer networks? A) Co...Discussethicalhacking
RSK Cyber Securityrskcybersecurity.hashnode.dev·Nov 18, 20225 Best VAPT Tools – Vulnerability Assessment and Penetration TestingVAPT (Vulnerability Assessment and Penetration) Testing still stands as the most effective and efficient cybersecurity measure to fortify your security posture. You can eliminate security risks by identifying the vulnerabilities present within your w...Discuss·50 readsvapt