POOJA GAONKAR

Web Application Attacks – Types, Impact & Mitigation – Part-2

With this article, we list some of the common Web Application Attacks part-2, impacts, and possible mitigation. In part -2 we are covering the following attacks.Session FixationFrame InjectionDirectory Listing EnabledQuery Parameter Sent In Get RequestInadequate Account Lockout and session...

Android Application Penetration Testing Part 2

With my last article(Android Application Penetration testing Part 1) we had look at the basic architecture of the Android device. Now Let’s collect some Android Application Pentesting tools and build setup for hacking:There are many tools for an android...

Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide

Cyber Security operations center is protecting organizations and the sensitive business data of customers.It ensures active monitoring of valuable assets of the business with visibility, alerting and investigating threats, and a holistic approach to managing risk.Analytics service can...
spot_img

latest articles