Friday, December 6, 2024
Home Tags Pentesting

Tag: Pentesting

- Advertisement -
Google search engine

RECENT

SIMILAR

Reverse Engineer Assembly: Flags and Memory Addressing

0
Flags are special indicators used by the processor to signal the outcome of operations, these are stored in a special register called the flags register. Some common flags include: Zero Flag (ZF) - 1 if the result of an operation is zero; otherwise, it’s 0. Sign...

Different Types of Firewalls Explained (WAF, HBF, NBF, NGFW)

0
Web Application Firewall (WAF) It’s a Firewall that operates at the Application Layer (Layer 7 OSI) that’s designed to monitor, filter and block HTTP/HTTPS traffic to and from a Web Application. This type of firewall can be deployed in two different methods: Proxy Mode: It directly receives...

ORM Vulnerabilities

0
ORM (Object-Relational Mapping) is a programming technique that allows developers to interact with a database using object-oriented paradigm of a programming language instead of writing raw SQL queries. In an object-oriented language, you work with objects and classes. An object is an instance of a...