Skip to content

AppSec, Network Security, Penetration Testing, Bug Bounties, Coding and more..

Menu
  • Home
  • OWASP TOP 10
    • OWASP TOP 10
    • OWASP API TOP 10
    • OWASP MOBILE TOP 10
    • SANS TOP 25
  • PENTESTING
    • WEB SECURITY
    • Web App Pentest
    • API Pentest
    • Android Pentesting
    • 0day
    • Windows Pentesting
    • Linux Pentesting
    • Active Directory Pentest
    • Linux Priv-Escalation
    • Windows Priv-Escalation
  • Coding
    • GoLang
    • Python
    • PowerShell
    • Bash Scripting
    • Batch Scripting
    • Java
  • Network Study
    • Networking Basics
    • TCP-IP/OSI Model
    • Essential Protocols
  • CTF
    • Vuln-Hub
  • Certification
    • CEH
    • OSCP
  • My Tools
  • Portfolio

Category: WEB SECURITY

Posts related to Web Application Security

Posted onOctober 24, 2021October 24, 2021PROGRAMMING AND SCRIPTING, WEB SECURITY

What is Same Origin Policy : A Beginners Guide To SOP

by AdminLeave a comment on What is Same Origin Policy : A Beginners Guide To SOP

The same-origin policy is an important concept in the web application security model. The same-origin policy restricts how a document or script loaded from one…

Read More
Posted onOctober 24, 2021October 24, 2021PROGRAMMING AND SCRIPTING, WEB SECURITY

What is Cross Origin Resource Sharing : Beginners Guide To CORS

by AdminLeave a comment on What is Cross Origin Resource Sharing : Beginners Guide To CORS

Cross-origin resource sharing (CORS) is a standard for accessing web resources on different domains. CORS allows web scripts to interact more openly with content outside…

Read More
Posted onOctober 23, 2021SYSTEM SECURITY, TOOLS, WEB SECURITY

How to use THC Hydra for bruteforcing Web app Login Forms

by AdminLeave a comment on How to use THC Hydra for bruteforcing Web app Login Forms

Hydra is an online login cracker and form bruteforcer which supports numerous protocols to attack. It is very fast and flexible and this tool makes…

Read More
Posted onOctober 23, 2021October 23, 2021EXPLOIT, SYSTEM SECURITY, WEB SECURITY

Exploiting Apache Struts2.5 REST Plugin Vulnerability

by AdminLeave a comment on Exploiting Apache Struts2.5 REST Plugin Vulnerability

Apache Struts is a free, open-source, MVC framework for creating modern Java web applications. It enables the developer to create maintainable, extensible, and flexible web…

Read More
Posted onSeptember 25, 2021September 25, 2021SYSTEM SECURITY, TOOLS, WEB SECURITY

Wireshark Starter Guide for Beginners

by AdminLeave a comment on Wireshark Starter Guide for Beginners

Wireshark is an open source network packet analyzer/sniffer which captures data packets from network interfaces and show then in readable form for analysis. Wireshark supports…

Read More
Posted onSeptember 22, 2021September 22, 2021PROGRAMMING AND SCRIPTING, TOOLS, WEB SECURITY

Banner Grabbing with Python

by AdminLeave a comment on Banner Grabbing with Python

In the Previous post we saw the basics of banner grabbing techniques. Now here i wrote a basic python script, which grab banner for a…

Read More
Posted onSeptember 16, 2021September 16, 2021CAPTURE THE FLAG, SYSTEM SECURITY, TOOLS, WEB SECURITY

What is Banner Grabbing : Guide for Beginners

by AdminLeave a comment on What is Banner Grabbing : Guide for Beginners

Banner grabbing is a technique used to gain information about a computer system on a network and the services running on its open ports. An…

Read More

Posts navigation

Previous Page Page 1 Page 2 Page 3

About Me

Hi, My name is Ajay Kumar Tekam, I am a Cyber Security Enthusiast and currently looking for opportunity to work in cyber security positions. The area of my interests are Web Pentesting, Mobile Application Pentesting and Network Pentesting. Currently i do bog hunting at bugcrowd.com as a freelancer. In my free time i write security automation tools in python, GoLang and Bash. You can find my portfolio, CV and more about me at ajaytekam.github.io

Recent Posts

  • How DNS Works : Guide To DNS Security
  • ANDROID PENTESTING SERIES PART 2 : Overview of Android Components
  • ANDROID PENTESTING SERIES PART 3 : Overview of Android Security
  • ANDROID PENTESTING SERIES PART 9 : SSL Pinning Bypass with Frida Server
  • ANDROID PENTESTING SERIES PART 6 : Setting up Android Pentest Lab

Categories

  • 0day
  • Android Pentesting
  • API Pentest
  • CAPTURE THE FLAG
  • CEH
  • EXPLOIT
  • GENERAL IT
  • LINUX SYS ADMIN
  • OWASP API TOP 10
  • OWASP TOP 10
  • PENTESTING
  • PROGRAMMING AND SCRIPTING
  • SYSTEM SECURITY
  • TOOLS
  • WEB SECURITY

Archives

  • July 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress