Business Logic Vulnerability | ADM Group

Summary

Server-Side Template Injection | Splunk UF RCE

Summary

Issues: open svn port > misconfigured svn system > unrestricted file upload > misconfigured settings

Summary

Ghidra is a free and open-source Software for Reverse Engineering of executable program(Binary) including Mobile Apps. Ghidra supports installation on multiple OS platforms inc. Windows, Linux and MacOS.

Installing Ghidra

  • Download ghidra.
  • While ghidra is being downloaded, open linux terminal and install the required dependencies before…

In simple terms, Symmetric Key Cryptography is a single, shared key and is used to perform both encryption and decryption process.

https://www.101computing.net/symmetric-vs-asymmetric-encryption/

Steps to Perform Symmetric Encryption

  1. Choose a Symmetric Encryption Algorithm and Key Size. The larger the key, the harder it is to…

K O M A L

Cyber Security Enthusiast

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store