Blog

IDOR – Do you know what I am doing ?

An application provides direct access to an object, such as a file or a database record, based on user-supplied input. This can allow an attacker to bypass the application’s access controls and access sensitive information or perform unauthorised actions it is called as an IDOR (Insecure Direct Object Reference) vulnerability.  Attacker can manipulate the URL…

continue reading

Windows Buffer Overflows – 32 Bit.

Get the Buffer Overflow in 11 Steps. I. Install the immunity debugger on source machine. II. Find the Vulnerable parameter in the victim application by crashing it. Providing high volume of input. III. Identify the location [That 4 Bytes] where crash is happening by Fuzzing the application. IV. Get the exact EIP pointer with the…

continue reading

SYSMON – Free EDR?

Protecting Endpoints are challenging. It has become more crucial after the COVID pandemic. Work from Home has made Cybersecurity more proactive from reactive. Endpoint detection and response (EDR) is providing security for user machines. It helps to protect Files, Web, and Removable media. But acquiring EDR is not easy for all firms. Giant institutions, they…

continue reading

Be Ready for Cyber War

If we know how to hack, we can protect us from being hacked. In this Hacking Tutorial, we will see the basics of hacking. But don’t try this in public domains or networks. Try this is in your own private network. While hacking a system, application or database, the phases are same. But attack method…

continue reading

How Organizations Detect the Cyber Attacks?

Organizations running with more than 1000 employees, need to have big infrastructure.  Organizations running with more than 100,000 employees need to have very big infrastructure. Providing security to this infrastructure is very challenging. When it comes to security, providing physical security is not enough. Organizations need to invest much more on cyber security. Multilayered security…

continue reading

TOP RANSOMWARE ATTACKS OF 2021

         As we all know, the year 2020 falls out of ordinary circumstances. This is because many organizations were in a situation to adapt to new environment and meet new challenges. The sudden change disrupted the schedule of billions of people around the world by forcing them to stay indoors. This pandemic situation continued to the…

continue reading