Skip to content

AppSec, Network Security, Penetration Testing, Bug Bounties, Coding and more..

Menu
  • Home
  • OWASP TOP 10
    • OWASP TOP 10
    • OWASP API TOP 10
    • OWASP MOBILE TOP 10
    • SANS TOP 25
  • PENTESTING
    • WEB SECURITY
    • Web App Pentest
    • API Pentest
    • Android Pentesting
    • 0day
    • Windows Pentesting
    • Linux Pentesting
    • Active Directory Pentest
    • Linux Priv-Escalation
    • Windows Priv-Escalation
  • Coding
    • GoLang
    • Python
    • PowerShell
    • Bash Scripting
    • Batch Scripting
    • Java
  • Network Study
    • Networking Basics
    • TCP-IP/OSI Model
    • Essential Protocols
  • CTF
    • Vuln-Hub
  • Certification
    • CEH
  • My Tools
  • Portfolio

Category: CEH

Posted onDecember 28, 2021December 30, 2021CEH, OWASP TOP 10, PENTESTING, WEB SECURITY

SQL Injection Vulnerability Explained | OWASP Top 10 2021 | A3 – Injection

by AdminLeave a comment on SQL Injection Vulnerability Explained | OWASP Top 10 2021 | A3 – Injection

Introduction SQL injection or SQLi is a web application security weakness that allows attackers to control an application’s database by tempering with the database query.…

Read More
Posted onDecember 27, 2021December 27, 2021CEH, OWASP TOP 10, PENTESTING, WEB SECURITY

Injection Vulnerabilities in Web Applications | A03 – OWASP TOP 10 2021

by AdminLeave a comment on Injection Vulnerabilities in Web Applications | A03 – OWASP TOP 10 2021

Introduction Injection vulnerabilities occurs when web applications process untrusted user supplied data as a part of command or database query without performing any sanitization and…

Read More
Posted onDecember 26, 2021July 7, 2022CEH, OWASP TOP 10, PENTESTING, WEB SECURITY

Cryptographic Failures in Web Applications | A02 – OWASP TOP 10 2021

by AdminLeave a comment on Cryptographic Failures in Web Applications | A02 – OWASP TOP 10 2021

Cryptographic Failures Cryptographic Failures refers to the failures related to cryptography which often lead to leak/exposure of sensitive data. In OWASP Top 10 2017 list…

Read More
Posted onDecember 22, 2021December 22, 2021CEH, OWASP TOP 10, PENTESTING, WEB SECURITY

Broken Access Control Vulnerability Basics | A01 – OWASP TOP 10 2021

by AdminLeave a comment on Broken Access Control Vulnerability Basics | A01 – OWASP TOP 10 2021

Define Broken Access Control Broken Access Control : In a web application the broken access control vulnerability arises when the application fails to properly validate…

Read More
Posted onNovember 10, 2021November 10, 2021CEH, PENTESTING, SYSTEM SECURITY, TOOLS

Metasploit Series : Part 1 – Basics of Metasploit

by AdminLeave a comment on Metasploit Series : Part 1 – Basics of Metasploit

Metasploit Basics Metasploit is an Open Source Exploitation Framework developed by Rapid7, used for simulated attack during penetration testing. It provides a platform and tooling…

Read More
Posted onNovember 5, 2021November 5, 2021CEH, LINUX SYS ADMIN

Linux System and Process Management Commands : Part 3

by AdminLeave a comment on Linux System and Process Management Commands : Part 3

nohup Nohup, short for no hang up is a command in Linux systems that keep processes running even after exiting the shell or terminal. Nohup…

Read More
Posted onNovember 4, 2021November 4, 2021CEH, GENERAL IT, LINUX SYS ADMIN

Linux System and Process Management Commands : Part 2

by AdminLeave a comment on Linux System and Process Management Commands : Part 2

nmon nmon shows performance data about cpu, memory, network, disks, file systems, nfs, top processes, resources, power micro-partition. Command keys to show following details m…

Read More
Posted onNovember 3, 2021November 4, 2021CEH, LINUX SYS ADMIN

Linux System and Process Management Commands : Part 1

by AdminLeave a comment on Linux System and Process Management Commands : Part 1

uptime Shows how long the system is running. top Displays Linux processes, provides a dynamic real-time view of a running system. htop It is interactive/scrollable…

Read More

Posts navigation

Previous Page Page 1 Page 2

About Me

Hi, My name is Ajay Kumar Tekam, I am a Cyber Security Enthusiast and currently looking for opportunity to work in cyber security positions. The area of my interests are Web Pentesting, Mobile Application Pentesting and Network Pentesting. Currently i do bog hunting at bugcrowd.com as a freelancer. In my free time i write security automation tools in python, GoLang and Bash. You can find my portfolio, CV and more about me at ajaytekam.github.io

Recent Posts

  • CERTIFIED ETHICAL HACKER MODULE 03 : Network Scanning
  • Certified Ethical Hacker Module 02 : Footprinting and Reconnaissance
  • ANDROID PENTESTING SERIES PART 7 : Static Application Analysis
  • AJAX Crash Course for WebApp Security
  • Certified Ethical Hacker Module 01 : Introduction To Ethical Hacking

Categories

  • 0day
  • Android Pentesting
  • API Pentest
  • CAPTURE THE FLAG
  • CEH
  • Certification
  • EXPLOIT
  • GENERAL IT
  • InfoSec Certs.
  • LINUX SYS ADMIN
  • OWASP API TOP 10
  • OWASP TOP 10
  • PENTESTING
  • PROGRAMMING AND SCRIPTING
  • SYSTEM SECURITY
  • TOOLS
  • Uncategorized
  • WEB SECURITY

Archives

  • September 2022
  • August 2022
  • July 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress