Solidmonster
Enter a key term, phrase, name or location to get a selection of only relevant news from all RSS channels.
Enter a domain's or RSS channel's URL to read their news in a convenient way and get a complete analytics on this RSS feed.
Unfortunately Solidmonster has no news yet.
[...] . Human beings are weakest links! Courtesy: http://socialengineeringattacks.blogspot.com Social Engineering is an art of wangling people to reveal confidential information which is not supposed to be [...]
[...] responds only on a particular network. 7. One of the easiest and craziest way would be Social Engineering. It is an art of wangling people to reveal confidential information which is not supposed [...]
[...] This blog post is all about my first experience with Security Testing on APIs. Back in 2013, I was working on a project “XYZ” in Moolya Software Testing. It all [...]
[...] Infographic: State of Security Testing by Nagasahas Dasa and Santhosh Tuppad The post Infographic: State of Security Testing by [...]
[...] an interface, and has simple commands to extract information from the database. The post Security Testing for Beginners appeared first on SolidMonster. [...]
[...] which I will be sharing in this post. Information gathering is not just one phase in security testing! Its an art where each one of us should be a master shifu at gathering relevant info for a [...]
[...] Google in finding the sites which has possibility of having the application vulnerable using Google Dorks. What are Google Dorks? Google dorks or Google Operators are the center of attraction for [...]
[...] tried to find out what they are. I referred to many articles and found that they are called as GOOGLE DORKS. I even came across some of the terminologies like White, Black and Grey hat hackers. During [...]
[...] SQL query string used in a bound or parameterized query should never be dynamically built from user input. g) Terminate/abort invalid inputs: This is a safety and final strategy on unaccepted [...]
[...] exploits security vulnerability in an application’s software. The vulnerability happens when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements [...]
This blog post is all about my first experience with Security Testing on APIs. Back in 2013, I was working on a project “XYZ” in Moolya Software [...]
[...] . Human beings are weakest links! Courtesy: http://socialengineeringattacks.blogspot.com Social Engineering is an art of wangling people to reveal confidential information which is not supposed to be [...]
[...] responds only on a particular network. 7. One of the easiest and craziest way would be Social Engineering. It is an art of wangling people to reveal confidential information which is not supposed [...]