CALL US

+91 9116117170

Category: Network & Security

Abusing the AWS Metadata services using SSRF

By Devashish Soni 0 Comment March 5, 2020

What is AWS AWS stands for amazon web services. It is a platform that offers reliable, flexible, easy-to-use, cost-effective and scalable cloud computing solutions. What is SSRF SSRF stands for Server-Side Request Forgery. It is a vulnerability that let’s an attacker send crafted requests from the back-end server of a vulnerable web application. Attackers usually […]

CIA Triad - Cyberops

What is CIA Triad of Information Security?

By Annu Choudhari 0 Comment June 11, 2019

Modern hackers are able to hack absolutely everything, from airplanes, cars, sensor equipment and ending with locks with TSA function, voting booths and medical devices. The overall picture is even worse. Former director of the National Security Agency, Mike McConnell, suspects that China has cracked “all major corporations” of the United States. Edward Snowden found […]

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Shaurya Sharma 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment, the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical knowledge. What is VAPT? Vulnerability Assessment and […]

Penetration Testing - Cyberops

What is Penetration Testing?

By Shaurya Sharma 0 Comment May 18, 2018

Penetration testing is one of the methods to identify areas of the system that are vulnerable to intrusion and compromise integrity and reliability from unauthorized and malicious users or entities. The penetration testing process includes deliberate authorized attacks on the system, able to identify both its weakest areas and security gaps from third-party intrusions, and […]

5 Best Ways To Monitor DNS Traffic For Security Threats

By Shaurya Sharma 0 Comment January 30, 2018

5 Best Ways To Monitor DNS Traffic For Security Threats –   DNS (Domain Name System) is responsible for IP resolving i.e domain names like cyberops.in will be resolved to its particular IP address as x.x.x.x. But nowadays DNS attacks are in practice in which your ip is resolved to some malicious or phishing pages […]

error: Content is protected by Cyberops !!