ContentPosts from @arth_kumar11..
Story
@arth_kumar11 shared a post, 2 years, 7 months ago
Author

Making a Link Extractor In Python

Link Extractor In Python

Screenshot_2022-06-12_14-54-30.png
Story
@arth_kumar11 shared a post, 2 years, 7 months ago
Author

Explaining Enumeration and Its Types

SNMP Enumeration tools are utilized to examine a solitary IP address or a scope of IP addresses of SNMP empowered organization gadgets to screen, analyze, and investigate security dangers. Instances of this sort of instrument incorporate NetScanTolls Pro, SoftPerfect Network Scanner, SNMP Informant,..

1_vkS8_wKYryn6jSnvQBp9Mg.png
Story
@arth_kumar11 shared a post, 3 years ago
Author

Explaining Insecure Deserialization

Insecure deserialization has been ranked as #8 on the OWASP TopTen List of the most critical security risks to web applications since 2017, along with other risks such as an injection vulnerability.

1_F8iaR-ct2Q_O2XtjCeLVGA.jpeg
Story
@arth_kumar11 shared a post, 3 years ago
Author

Explaining DirBuster

DirBuster is a file/directory penetration testing tool with a Graphic User Interface (GUI) that is used to brute force directories and file names on web application servers.

Story
@arth_kumar11 shared a post, 3 years ago
Author

Making a SQL Scanner In Python

Learn how to build a simple Python script to detect SQL injection vulnerability in web applications.

SQL Injection
Story
@arth_kumar11 shared a post, 3 years ago
Author

Making an XSS Scanner In Python

As you may see, the XSS vulnerability is successfully detected, now this code isn't perfect for any XSS vulnerable website, if you want to detect XSS for a specific website, you may need to refactor this code for your needs. The goal of this tutorial is to make you aware of this kind of attack ..

Story
@arth_kumar11 shared a post, 3 years ago
Author

Explaining Vulnerability Scanner

A vulnerability scanner is an automated vulnerability testing tool that monitors for misconfigurations or coding flaws that pose cybersecurity threats.

Story
@arth_kumar11 shared a post, 3 years ago
Author

Cookie Tracking and Stealing using Cross-Site Scripting

This article discusses how cookies move around the web and how they can be stolen.

1_700bKvYNzBQeqb8IqNxjRQ.jpeg
Story
@arth_kumar11 shared a post, 3 years ago
Author

Explaining Port Scanning

A port scan is a common technique hackers use to discover open doors or weak points in a network. A port scan attack helps cyber criminals find open ports and figure out whether they are receiving or sending data. It can also reveal whether active security devices like firewalls are being used by an organization.

1_L-Xo0rPwxl854n3zDothmw.png
Story
@arth_kumar11 shared a post, 3 years ago
Author

Making a WiFi Scanner In Python

In this tutorial, we wrote a simple Wi-Fi scanner using the Scapy library that sniffs and decodes beacon frames which are transmitted every time by access points, they serve to announce the presence of a wireless network.