Know Your Security

Monday, May 28, 2018

Securing RESTful APIs using OAuth

›
What is OAuth The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either...
Sunday, May 27, 2018

CSRF Synchronizer Token

›
CSRF CSRF is an attack that tricks the victim into submitting a malicious request. It inherits the identity and privileges of the victim ...

CSRF Double Submit Cookie

›
What is CSRF? Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in w...
Tuesday, October 24, 2017

Veil 3.0 For Undetectable Payloads

›
As I mentioned in the previous post , it is very important to have undetectable payloads if you want to attack a target with anti-malware se...
Sunday, July 30, 2017

Passive Reconnaissance Using Shodan

›
Shodan is a search engine developed by John Matherly . Even though Shodan is called  as a search engine it is different from content sear...
Thursday, July 27, 2017

Evading Anti-Virus Detection with Shellter

›
Anti virus softwares are the last and only defense against malwares in most of the personal computers. So getting through them or evading...
Wednesday, July 26, 2017

Linux Basics - Networking Commands

›
If you are interested in computer security domain, it is important you have a good understanding about networking, particularly networking a...
›
Home
View web version

Author

Ashan
View my complete profile
Powered by Blogger.