Know Your Security
Monday, May 28, 2018
Securing RESTful APIs using OAuth
›
What is OAuth The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either...
Sunday, May 27, 2018
CSRF Synchronizer Token
›
CSRF CSRF is an attack that tricks the victim into submitting a malicious request. It inherits the identity and privileges of the victim ...
CSRF Double Submit Cookie
›
What is CSRF? Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in w...
Tuesday, October 24, 2017
Veil 3.0 For Undetectable Payloads
›
As I mentioned in the previous post , it is very important to have undetectable payloads if you want to attack a target with anti-malware se...
Sunday, July 30, 2017
Passive Reconnaissance Using Shodan
›
Shodan is a search engine developed by John Matherly . Even though Shodan is called as a search engine it is different from content sear...
Thursday, July 27, 2017
Evading Anti-Virus Detection with Shellter
›
Anti virus softwares are the last and only defense against malwares in most of the personal computers. So getting through them or evading...
Wednesday, July 26, 2017
Linux Basics - Networking Commands
›
If you are interested in computer security domain, it is important you have a good understanding about networking, particularly networking a...
›
Home
View web version