This user doesn't have a profile picture yet.

Registered since July 2nd, 2020

Has a total of 17 bookmarks.

Showing top Tags within 2 bookmarks

cybersecurity   nesa   nesacompliance   informationsecurity   pcidss   bcp   pentesting   business   pciaudit   UAE   ccpacertification   nesaaudit   ecommerce   IAS Standards   vapt   BankingIndustry   linux   vistainfosec   hipaacompliance   SOC1   compliance   pcidsscompliance   pcicompliance   Security controls   soc2   Banking   ccpa   businesscontinuity   businessrisk   healthcareindustry   SOC1reporting   penetrationtesting   scp   security   soc2audit   Cooperativebank   ccpacompliance   bcpplan   datasecurity   vulnerabilityassessment   RBI   penetration testing   databreach   businesscontinuityplan   hipaa   owasp  

Tag selected: pentesting.

Clear all

Showing 2 results.

Looking up pentesting tag. Showing 2 results. Clear

Infovore CTF

Saved by Travisliska on September 15th, 2020.

We start with another boot2root machine from Vulnhub. This machine is called Infovore and is misconfigured by the administrators a very known vulnerability that appears in OWASP Top 10. As per the description of the machine, it is supposedly configured by lazy administrators and our job is to exploit innocent-looking PHP functions while capturing all 4 flags on the machine. We start with powering on the virtual machine.

owasp pentesting cybersecurity

Difference between Vulnerability Assessment & Penetration Testing

Saved by Travisliska on September 2nd, 2020.

In this post, we intend to clear the common misconception and highlight the differences between Vulnerability Assessment and Penetration Testing. The article details when and where each of the security assessment processes is used and applicable to organizations.

pentesting penetrationtesting vulnerabilityassessment vapt cybersecurity

No further bookmarks found.