OTP Bypass Security Issues and RemediationsIn this article we will discuss how OTP flow works and what are the possible techniques to bypass and get those fixed as a security…Apr 19Apr 19
Cookies in Tech world…Yes we are going to talk about cookies used in computers and not of cookies in bakery :)Jul 7, 2023Jul 7, 2023
SSL/TLS handshake in detailLet’s first brush up the basics to move ahead to understand SSL/TLS handshake.Jul 6, 20231Jul 6, 20231
TCS Hackquest 6 Practice ChallengesToday i am going to discuss with you all about the 3 challenges of TCS Hackquest 6 Practice (JS Master, The Flash, Elawn Musk) in the same…Nov 21, 2021Nov 21, 2021
Cyber Security Analyst challenge #2: CTF WalkthroughIntroduction Today we are going to crack a vulnerable Web Challenge. It was created by CloudSEK and its team. This is a Capture the Flag…Oct 15, 2020Oct 15, 2020
Malwares!!! and it’s variantsMalware is a program designed to gain access to computer systems for the benefit of some third party, without the user’s permission…Sep 28, 2020Sep 28, 2020
Ransomware — Wannacry and PetyaRansomware is as malicious software (malware) that hijacks users’ information, threatening to either display it publicly or block access…Sep 25, 2020Sep 25, 2020