Search
ninp0
Dec 27, 20223 min read
Lock Picking Village as a Team Building Activity
Team building is an important way for organizations to strengthen their relationships, strengthen bonds and build trust within the team....
6 views0 comments
ninp0
Dec 26, 20222 min read
How AI is Changing Offensive Security
Introduction: In this blog post, we will explore how artificial intelligence (AI) and machine learning (ML) can be used to improve...
4 views0 comments
ninp0
Dec 25, 20222 min read
Safe Cracking - The Art of Manipulation
Introduction Safe cracking is a skill that has been around for centuries. It is an art that requires a combination of knowledge, skill,...
7 views0 comments
ninp0
Dec 25, 20222 min read
Fuzz Testing for Software Resiliency
1. Introduction to Fuzz Testing: What is it & What Benefits Does It Bring? Fuzz testing is a type of software testing that uses invalid,...
5 views0 comments
ninp0
Dec 25, 20222 min read
DOM-Based Blind XSS
DOM-Based Blind XSS DOM-based Blind XSS (Document Object Model-based Blind Cross-Site Scripting) is one of the most dangerous and...
89 views0 comments
ninp0
Dec 24, 20223 min read
Importance of DevSecOps in an Organization
Introduction DevSecOps is an important step to achieving the ultimate goal of any business – continual security and delivery excellence....
3 views0 comments
ninp0
Dec 23, 20223 min read
Importance of SAST & DAST Security within Your Organization
Technology is a critical part of our everyday lives, and the need for robust security measures that safeguard digital assets has never...
3 views0 comments
ninp0
Dec 22, 20222 min read
Introduction to Continuous Penetration Testing
We have all heard of mainstream cyber security practices such as firewalls and antivirus software. These are traditional security...
3 views0 comments
ninp0
Dec 21, 20223 min read
Wardialing: Increase Telecommunication & Network Security with Proactive Testing
Page 1: Introduction to Wardialing Assessments When it comes to computer security, proactive monitoring and assessment should be one of...
7 views0 comments
ninp0
Dec 20, 20223 min read
Smashing the Stack
Introduction Stack overflow vulnerabilities are a type of software security vulnerability that occurs when a program attempts to write...
1 view0 comments
ninp0
Dec 19, 20222 min read
Format String Vulnerabilities
Format String Vulnerabilities Format string vulnerabilities are one of the most common security flaws in software applications. They...
1 view0 comments
ninp0
Dec 18, 20222 min read
Integer Underflow Vulnerabilities
Integer Underflow Vulnerabilities Integer underflow vulnerabilities are a type of software vulnerability that can be exploited to cause a...
3 views0 comments
ninp0
Dec 17, 20223 min read
Heap Overflows
Introduction Heap overflow vulnerabilities are a type of memory corruption vulnerability that occurs when a program allocates memory from...
8 views0 comments
ninp0
Dec 16, 20222 min read
Integer Overflow Vulnerabilities
Integer Overflow Vulnerabilities Integer overflow vulnerabilities are a type of software vulnerability that can occur when a program does...
5 views0 comments
ninp0
Dec 15, 20222 min read
Heap Spraying
Heap Spraying: An Overview Heap spraying is a method of exploiting computer software vulnerabilities which allows an attacker to execute...
2 views0 comments
ninp0
Dec 14, 20223 min read
Web Cache Deception
Introduction Web cache deception is an increasingly common practice used by malicious actors to manipulate the content of a website and...
2 views0 comments
ninp0
Dec 13, 20223 min read
How Threat Actors Bypass Multi-Factor Authentication
Introduction Multi-factor authentication (MFA) is a security system that requires more than one form of authentication to verify a user’s...
3 views0 comments
ninp0
Dec 11, 20222 min read
All About XSS
Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. It allows malicious...
4 views0 comments
ninp0
Dec 10, 20223 min read
SQL Injection aka SQLi
SQL injection is a type of cyberattack that exploits the vulnerabilities of a website or application to gain access to the backend...
3 views0 comments
ninp0
Dec 8, 20223 min read
Insecure Open Redirects
Introduction Open redirect attacks are a type of security vulnerability where a malicious actor is able to redirect a user from a...
4 views0 comments