Sign in

Realist and another anime lover

Hey folks 🙋

In this article I will be sharing how to set up a lab on your windows system using DVWA(Damn Vulnerable Web Application) for practicing OWASP Top 10 attacks. …

Hey fellas, I am glad to be back on Medium once again. (Well well! I know nobody cares 😂)

Whatever, I hope y’all are safe and doing great in this situation 😃 .

Now let’s get straight to the point. Recently I was going through few things on GitHub repositories…

Karberos: The three headed dog in Greek mythology
The Karberos dog( in Greek Mythology)

Nowadays authentication and security are a concern. Keeping secrecy and privacy in mind there are a lot of authentication protocols that are using those any user can verify to get access to any particular server/database or system. Among them, Kerberos is the most usable in client/server authentication.

Before going through…

Got a Vouch

Few months ago, while I was surfing LinkedIn and reading some technical posts, I saw some students like me, posting their achievements and contributions towards their communities. Being a newbie in the field of technology I didn’t even know where to start with. I was puzzled finding my interest. In…

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked”

― Richard Clarke

When I started to explore Cyber Security Field I had zero level knowledge about how things work. From zero to making a Website Crawler, the journey…


Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store