search
Follow Topic rss_feed

In the coding world Hashing and Encryption are two processes that are often used interchangeably when talking about security of information. However, though they might be used interchangeably they are two different processes that are used in difference places and it is important to note their differences to understand where to use them.

Bharat Dwarkani shared on Jan 26, 2020
image
dev.to
bookmarks
share
favorite_border0 visibility7
favorite_border0 visibility7 share bookmarks

This post is part of the series 'Vulnerabilities'. Be sure to check out the rest of the blog posts of the series! Impersonation and security SQL injections How to prevent CSRF attacks ASP MVC and XSRF Cross-site scripting (XSS) ASP MVC: Mass Assignment Regex - Deny of Service (ReDoS) (this post) Deserialization can be dangerous Prevent Zip bombs in .NET

Bharat Dwarkani shared on Jan 22, 2020
image
meziantou.net
bookmarks
share
favorite_border0 visibility15
favorite_border0 visibility15 share bookmarks

The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics. These cheat sheets were created by various application security professionals who have expertise in specific topics.

Bharat Dwarkani shared on Jan 19, 2020
image
cheatsheetseries.owasp.org
bookmarks
share
favorite_border0 visibility11
favorite_border0 visibility11 share bookmarks

In this course, you will learn the basics of Kali Linux. The course covers installation, using the terminal / command line, bash scripting, tools and features for ethical hacking, and more. The course focuses on Kali Linux but much of the content applies to other versions of Linux as well.

Bharat Dwarkani shared on Dec 15, 2019
image
youtube.com
bookmarks
share
favorite_border0 visibility4
favorite_border0 visibility4 share bookmarks

Learn network penetration testing / ethical hacking in this full tutorial course for beginners. This course teaches everything you need to know to get started with ethical hacking and penetration testing. You will learn the practical skills necessary to work in the field. Throughout the course, we will develop our own Active Directory lab in Windows, make it vulnerable, hack it, and patch it.

Bharat Dwarkani shared on Dec 15, 2019
image
youtube.com
bookmarks
share
favorite_border0 visibility2
favorite_border0 visibility2 share bookmarks

Isn’t it going to be nice if you can reach your pen-testing lab from all over the world? As we all know, this is a digital age that makes life easier than our expectations, thus anyone can access their information/data from the cloud. Similarly, a Pentester can design its pen-testing environment for the vulnerable machine on the cloud that can be accessed from anywhere.

Bharat Dwarkani shared on Dec 04, 2019
image
hackingarticles.in
bookmarks
share
favorite_border0 visibility2
favorite_border0 visibility2 share bookmarks

Nowadays, people are worrying to use the internet due to website security. Internet theft is increasing day by day. Users are trying to mislead the internet in recent years. So it is the developer’s responsibility to the internet well and we don’t want to make the way to malicious activities to take place in our own/undertaking applications.

Puthiya shared on Nov 20, 2019
image
rsagames.com
bookmarks
share
favorite_border0 visibility13
favorite_border0 visibility13 share bookmarks

JWTs (JSON Web Token, pronounced 'jot') are becoming a popular way of handling auth. This post aims to demystify what a JWT is, discuss its pros/cons and cover best practices in implementing JWT on the client-side, keeping security in mind.

Bharat Dwarkani shared on Sep 22, 2019
image
blog.hasura.io
bookmarks
share
favorite_border1 visibility14
favorite_border1 visibility14 share bookmarks

This article is full of tips to help you use Docker safely. If you’re new to Docker

Bharat Dwarkani shared on Sep 03, 2019
image
towardsdatascience.com
bookmarks
share
favorite_border0 visibility0
favorite_border0 visibility0 share bookmarks

By now, most of you have heard about the "Let's Encrypt" initiative. Provided by the Internet Security Research Group, the service uses open certificate authority. Also good: it's free and automated.

Bharat Dwarkani shared on Aug 26, 2019
image
datamation.com
bookmarks
share
favorite_border0 visibility4
favorite_border0 visibility4 share bookmarks
add