CALL US

+91 9116117170

Tag: how to

How to Automate IDOR using BurpSuit

By Devashish Soni 0 Comment February 28, 2020

What is IDOR IDOR stands for ‘Insecure Direct Object Reference’. It is a security vulnerability in which a user is able to change data or can access data of another users. IDOR occurs when the internal implementation of an object is done without proper validation mechanism which allow an attacker to gain access to these […]

How to setup and use Google Authenticator App in your Mobile

By Shaurya Sharma 0 Comment December 6, 2018

Many of you have heard about such a thing as two-factor (two-step) authentication and even use it, so in this tutorial you can learn that how to setup and use Google Authenticator App in your mobile. Since it helps to significantly increase the security of your accounts and makes it difficult for attackers to access […]

how to secure your data

How to Secure Your Data – Online Privacy Guide

By Shaurya Sharma 0 Comment September 27, 2018

Online Privacy Guide – How to Secure Your data Security and privacy: what’s the difference? Information security and confidentiality are closely related with each other, but still quite different. The service can be very secure, but not confidential. What is confidentiality? The essence of confidentiality is that you or others do not have access to your […]

Hacking IoT manufacturers and smart cars through APN (Access Point Network)

By Shaurya Sharma 0 Comment January 25, 2018

To connect to any cellular APN service, the device must have the following information: access point name, user name and password.This scheme works in the case of SIM-cards purchased from intermediaries. Before we go directly to the topic of the article, we will clarify the notion of APN: APN (Access Point Name), access to which […]

What is Windows Operating System

By Shaurya Sharma 0 Comment April 28, 2017

Microsoft Windows is a series of operating systems and operating environments, developed by Microsoft. The very first version of the Windows operating systems – MS-DOS, was introduced in 1985, it had a graphical user interface.It has secured the support of several documents, support for a computer mouse, a drop-down menu, and all that was possible […]

error: Content is protected by Cyberops !!