Briskinfosec - Your Perfect Cybersecurity Partner
+91 86086 34123
It is a well-known fact that most of the corporate organisations have been the target of black-hat hackers and hacktivist groups, and they were experiencing data breaches, server compromise etc.
Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.
Apache Struts is a free, open-source, MVC framework for creating elegant and modern Java web applications.
The term CRLF refers to Carriage Return (ASCII 13,
, \r) Line Feed (ASCII 10,
, \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.
Drupal is one of the most popular open source Content Management System (CMS) meant for developing, designing etc.
Most commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.
SQL injection is an attack when an attacker persuades to “inject” his harmful/malicious SQL code into someone else’s database, and force that database to run his SQL
Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.
The Cyber Kill Chain framework is a part of the Intelligence driven defense model for identification and prevention of cyber intrusion activities (i.e. Hack or Breach).
One of the fastest growing information technology careers is Ethical hacking.
Information has become the most valuable asset in today’s trend. There are many protective methods that are followed by many countries and organizations for ensuring consistent workflow.
OS command injection is a technique used via a web interface in order to execute OS commands on a web server. The user supplies operating system commands through a web interface in order to execute OS commands.
For a long time in the cyber security world, Web applications are subjected to various kinds of security vulnerabilities because of the increase in its usage and the use of dynamic web application technologies
A web application is helpless against Cross Site Port Attack if it forms client provided URL’s and does not disinfect the backend reaction obtained from remote servers previously while sending it back to the client.
Cross-site scripting (XSS) is one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications.
Copyrights © 2021 All Rights Reserved by Briskinfosec
Sign up to update with our latest news and products.
Your email is safe with us. We won't spam.