Introduction SQL injection or SQLi is a web application security weakness that allows attackers to control an application’s database by tempering with the database query.…
Introduction Injection vulnerabilities occurs when web applications process untrusted user supplied data as a part of command or database query without performing any sanitization and…
Cryptographic Failures Cryptographic Failures refers to the failures related to cryptography which often lead to leak/exposure of sensitive data. In OWASP Top 10 2017 list…
Define Broken Access Control Broken Access Control : In a web application the broken access control vulnerability arises when the application fails to properly validate…
Metasploit Basics Metasploit is an Open Source Exploitation Framework developed by Rapid7, used for simulated attack during penetration testing. It provides a platform and tooling…
nohup Nohup, short for no hang up is a command in Linux systems that keep processes running even after exiting the shell or terminal. Nohup…
nmon nmon shows performance data about cpu, memory, network, disks, file systems, nfs, top processes, resources, power micro-partition. Command keys to show following details m…
uptime Shows how long the system is running. top Displays Linux processes, provides a dynamic real-time view of a running system. htop It is interactive/scrollable…