Web Technologies

passive information gathering Using Different search engine

Greeting everyone Today we are going to Discuss Information Gathering using Github or Google dork, Shodan . As we know information gathering concept, the simplest way to define it would be the process of collecting information about something you are interested in which help us to further testing steps. Ethical hackers use a big variety …

passive information gathering Using Different search engine Read More »

VUlnerable WEp application | Securium Solutions

ARBITRARY FILE UPLOAD VULNERABILITY AT VARIOUS SECURITY LEVELS

Good Afternoon all, DVWA – DAMN VULNERABLE WEB APPLICATION. Some of you guys know well about DVWA, but this one is specially for beginners in cyber security, it may help someone who looks for arbitrary file upload Tutorial or Blogs Regarding that. You guys can download DVWA package from their website to host it in …

ARBITRARY FILE UPLOAD VULNERABILITY AT VARIOUS SECURITY LEVELS Read More »

Future Scope Java vs Python ?

Many developers would agree that python is simple and more productive and the other hand java is difficult and complex. The programming language writes an efficient program for critical problems and for mobile applications, web applications, and games, etc. Python has easy syntax while java has complex syntax. Python : Python is more productive than …

Future Scope Java vs Python ? Read More »