Jan 17, 20232 min readWeb SecurityWeb Application VulnerabilitiesWeb application vulnerabilities refer to weaknesses in the design, development, or deployment of web applications that can be exploited...
Jan 16, 20235 min readPentestingPentesting StagesPenetration testing, also known as pen testing, is a simulated cyber attack on a computer system, network or web application to evaluate...
Jan 16, 20233 min readScanningNmap Guide (network mapper)Nmap (Network Mapper) is a free and open-source tool for network exploration and security auditing. It can be used to discover hosts and...