Skip to content

AppSec, Network Security, Penetration Testing, Bug Bounties, Coding and more..

Menu
  • Home
  • OWASP TOP 10
    • OWASP TOP 10
    • OWASP API TOP 10
    • OWASP MOBILE TOP 10
    • SANS TOP 25
  • PENTESTING
    • WEB SECURITY
    • Web App Pentest
    • API Pentest
    • Android Pentesting
    • 0day
    • Windows Pentesting
    • Linux Pentesting
    • Active Directory Pentest
    • Linux Priv-Escalation
    • Windows Priv-Escalation
  • Coding
    • GoLang
    • Python
    • PowerShell
    • Bash Scripting
    • Batch Scripting
    • Java
  • Network Study
    • Networking Basics
    • TCP-IP/OSI Model
    • Essential Protocols
  • CTF
    • Vuln-Hub
  • Certification
    • CEH
  • My Tools
  • Portfolio

Month: September 2022

Posted onSeptember 18, 2022October 20, 2022CEH, Certification, InfoSec Certs.

CERTIFIED ETHICAL HACKER MODULE 03 : Network Scanning

by AdminLeave a comment on CERTIFIED ETHICAL HACKER MODULE 03 : Network Scanning

Network Scanning Network scanning refers to a set of procedures used for identifying hosts, ports and services in a network. Discovering systems on the network…

Read More
Posted onSeptember 18, 2022September 27, 2022CEH, Certification, InfoSec Certs.

Certified Ethical Hacker Module 02 : Footprinting and Reconnaissance

by AdminLeave a comment on Certified Ethical Hacker Module 02 : Footprinting and Reconnaissance

Footprinting Concepts Footprinting is a part of reconnaissance process which is used for gathering possible information about a target computer system or network. In computer…

Read More
Posted onSeptember 10, 2022September 10, 2022Uncategorized

ANDROID PENTESTING SERIES PART 7 : Static Application Analysis

by AdminLeave a comment on ANDROID PENTESTING SERIES PART 7 : Static Application Analysis

In static application analysis the application is analyzed by looking its source code and resources for vulnerabilities, sensitive data leaks like api key, hardcoded passwords,…

Read More
Posted onSeptember 5, 2022September 5, 2022PROGRAMMING AND SCRIPTING

AJAX Crash Course for WebApp Security

by AdminLeave a comment on AJAX Crash Course for WebApp Security

Introduction AJAX stands for Asynchronous JavaScript and XML. By using Ajax, a web application can send and retrieve data from a server asynchronously (in the…

Read More

About Me

Hi, My name is Ajay Kumar Tekam, I am a Cyber Security Enthusiast and currently looking for opportunity to work in cyber security positions. The area of my interests are Web Pentesting, Mobile Application Pentesting and Network Pentesting. Currently i do bog hunting at bugcrowd.com as a freelancer. In my free time i write security automation tools in python, GoLang and Bash. You can find my portfolio, CV and more about me at ajaytekam.github.io

Recent Posts

  • CERTIFIED ETHICAL HACKER MODULE 03 : Network Scanning
  • Certified Ethical Hacker Module 02 : Footprinting and Reconnaissance
  • ANDROID PENTESTING SERIES PART 7 : Static Application Analysis
  • AJAX Crash Course for WebApp Security
  • Certified Ethical Hacker Module 01 : Introduction To Ethical Hacking

Categories

  • 0day
  • Android Pentesting
  • API Pentest
  • CAPTURE THE FLAG
  • CEH
  • Certification
  • EXPLOIT
  • GENERAL IT
  • InfoSec Certs.
  • LINUX SYS ADMIN
  • OWASP API TOP 10
  • OWASP TOP 10
  • PENTESTING
  • PROGRAMMING AND SCRIPTING
  • SYSTEM SECURITY
  • TOOLS
  • Uncategorized
  • WEB SECURITY

Archives

  • September 2022
  • August 2022
  • July 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress