CALL US

+91 9116117170

Category: Web Application Security

Owasp Top 10:A5: Broken Access Control (Impact & Mitigation)

By Annu Choudhari 0 Comment July 11, 2019

what is Broken Access Control? Broken access control is a very common and very vulnerable vulnerability. Many sites have the potential to accidentally provide access to unauthorized visitors who just cut out a URL that seems to be unsafe and paste it into a browser. Description  Access control, sometimes called authorization, is how a web […]

OWASP - Cyberops

What is OWASP? Top 10 Vulnerabilities?

By Annu Choudhari 0 Comment June 11, 2019

The modern world carries thousands of threats and potential dangers at every step and every moment of time. The global network, which has become an integral part of our life, is no exception. Cyber crime is now more developed than ever – after all, almost every company has its own website on the Internet, and […]

what is vapt

What is VAPT and Why would your Organization need VAPT Audit?

By Shaurya Sharma 0 Comment March 4, 2019

Purpose The purpose of the document is to highlight the basic concepts of vulnerability assessment, the reader should have some basic technical knowledge in the field of information technology in order to understand the content of the article, however, this document does not go deep into deep technical knowledge. What is VAPT? Vulnerability Assessment and […]

How to bypass root password of phpmyadmin

By Shaurya Sharma 0 Comment October 4, 2017

Phpmyadmin- This is very important setup in your XAMPP server setup, and by default xampp provide null password of root user in phpmyadmin, whenever you setup the root password, and if you are forgot the password or root user, then there are no option to change or reset the root password of phpmyadmin. In this […]

How to trace & get the IP Address of the target person

By Shaurya Sharma 0 Comment September 3, 2016

IP (Internet Protocol) Address is one of the most important components or part of the internet, as well as cyber forensics. With the help of IP address all digital devices, computers communicate with each other, and this is allotted to that device, such as static or dynamic. That all the reasons law enforcement agencies are […]