Our Blog

Filters
Reset

Insecure Deserialization Attacks

Web
What is Serialization? Serialization is the process of converting an object in memory into a format that can be stored or transmitted. This format is often a sequence of bytes.…

A Nerd’s Guide To Cracking CTF Challenges Part-1

CTF
Introduction Capture the Flag (CTF) challenges are a popular way for cybersecurity enthusiasts to test their skills and learn new techniques. While they can be daunting for beginners, a systematic…

Burp 105 : Burp Suite Repeater Guide

Web
  By right-clicking on a request and selecting Send to Repeater or doing so with the Action button in the proxy interception section, you can send requests to the repeater…

Burp 104 : Burp Suite Proxy Guide

Web
  The Proxy tab allows you to modify and send intercepted requests and view your request history. When you first view this tab you won’t have any intercepted requests and…

Burp 103 : Target Component

Web
  The Target tag allows you to view the site map of the target site, as well as what requests you’ve made and what findings you have found for each…