Blog
Broken Access Control – TOP 1 Vulnerability Web
Broken Access Control is the TOP 1 vulnerability in the OWASP ranking . We will…
Subdomain Enumeration: How to Expand the Attack Surface
Subdomain enumeration aims at finding subdomains from a given domain. This strategy is an important…
Concepts required to start in cybersecurity
In this post, we review the basic concepts that are needed to start cybersecurity. This…
Ethical Hacking Report: Tools to Make Your Documentation Easier
Writing a report is one of the last tasks in an ethical hacking project. If…
Confidentiality, Integrity, Availability: The CIA Triad
Confidentiality, integrity, and availability are the CIA triad and the essential properties of cyber security….
OS Fingerprinting: How to Find a Host Operating System
Operating System (OS) fingerprinting is a technique used in ethical hacking to determine what operating…