CALL US

+91 9116117170

Category: Latest Vulnerabilities

Owasp Top 10:A5: Broken Access Control (Impact & Mitigation)

By Annu Choudhari 0 Comment July 11, 2019

what is Broken Access Control? Broken access control is a very common and very vulnerable vulnerability. Many sites have the potential to accidentally provide access to unauthorized visitors who just cut out a URL that seems to be unsafe and paste it into a browser. Description  Access control, sometimes called authorization, is how a web […]

OWASP - Cyberops

What is OWASP? Top 10 Vulnerabilities?

By Annu Choudhari 0 Comment June 11, 2019

The modern world carries thousands of threats and potential dangers at every step and every moment of time. The global network, which has become an integral part of our life, is no exception. Cyber crime is now more developed than ever – after all, almost every company has its own website on the Internet, and […]

How to Exploit a Network Service through Buffer Overflow

By Shaurya Sharma 0 Comment October 6, 2018

We had a great time exploiting the vulnerabilities of the buffer overflow of Protostar virtual machine, but now it’s time to move on and search for more complex tasks. We had a great time exploiting the vulnerabilities of the Protostar virtual machine , but now it’s time to move on and search for more complex tasks. And such […]

How to hijack Telegram and Whatsapp with SS7 flaw

By Shaurya Sharma 0 Comment June 17, 2016

This individual world’s most popular get across platform messaging App is observed to be ultimate crack or hack into by many because it has recently enabled 256-bit encryption. For ordinary spirits this encryption would take days and months to decode a sentence or a complete message. Chant with another secure messages service called Telegram. Although […]