The type of malicious behavior builds to emphasize on the application layer of the OSI model with an intent to disrupt – mainly the availability of the features of the target web…
Category: SECURITY
Email Security – How does it really work?
It’s safe to believe that almost all of us who are reading this blog, right now have used email at least once. Electronic mail, commonly known as email enables users to communicate…
What is a self-signed certificate, and why does one need it?
One may have heard at least heard once about the self-signed certificate working in the computer science domain. In short, a self-signed certificate is a digital certificate that is not signed by…
Possible attacks by using Msvenom
Once the file developed using Msvenom is successfully executed into the victim’s computer then the following attacks can be performed by the attacker- in this case, Kali Linux 2020. At first, we…
what is SSL stripping method?
ssl stripping, is it a potential threat? How does it work and what are the precaution to avoid such an attack? SSL Stripping or SSL Downgrade Attack as the name implies is…