Open in app
Home
Notifications
Lists
Stories

Write
Suraj Dhamak
Suraj Dhamak

Home
About

Feb 18

Cryptographic Failures— OWASP Top 10

Cryptographic Failure is listed second in the OWASP Top 10–2021. According to 2017 list this vulnerability was at third position and earlier it was known as Sensitive Data Exposure. Basically this vulnerability focuses on failures in the cryptography mechanism which often leads to exposure of sensitive data. To understand this…

Life

4 min read

Cryptographic Failure — OWASP Top 10
Cryptographic Failure — OWASP Top 10

Jan 19

Broken Access Control — OWASP Top 10

Broken access control is listed first in the OWASP Top 10–2021. According to 2017 list this vulnerability was at fifth position. As per the stats, 94% applications were tested for some form of broken access control. Access control is nothing but to apply certain constraints on ‘ who can perform…

Cybersecurity

4 min read

Broken Access Control — OWASP Top 10
Broken Access Control — OWASP Top 10

Sep 10, 2021

OWASP Top 10 2021

Recently OWASP released a peer review draft of top 10 vulnerabilities, introducing three new members in the list. Lets take a brief overview: OWASP Top 10 2021 list: A01 : 2021- Broken Access Control A02 : 2021- Cryptographic Failures A03 : 2021- Injection A04 : 2021- Insecure Design [NEW] A05 : 2021- Security Misconfiguration A06…

Owasp Top 10

4 min read


Jun 21, 2021

DNS: Domain Name System

What is DNS? Over a network, the computers always identify each other with the help of unique numbers called IP addresses. They don't understand human languages. We as users always use human languages in order to search for something over the web. To access Facebook we search (www.facebook.com), but computers…

Cybersecurity

3 min read

DNS: Domain Name System
DNS: Domain Name System

Jun 8, 2021

OSI Model

OSI Model What is the OSI model and how it works? OSI stands for Open Systems Interconnection Model. This model is generally used to explain, the flow of data over a network or how exactly communication takes place over a network. …

Networking

5 min read

OSI Model
OSI Model

Jun 3, 2021

Data — The new supreme power

In today’s era, information is directly equivalent to power. One who has data and knows how to utilize it in every possible way is considered to be superior to others. With this increased value for information or data there comes increased demand for data sets with information related to many…

Data

3 min read

Data — The New Supreme Power
Data — The New Supreme Power

Apr 19, 2021

WHEN PHOTONS PROVIDE INTERNET!!

LiFi Technology! Light Fidelity, abbreviated as LiFi is the future of information super-highway, commonly known as the internet. Wi-Fi came out for people in 1997, since then till now we are very familiar with Wi-Fi. Charles Darwin quotes “Evolution is the key to success”. And when we are a part…

Technology

3 min read

WHEN PHOTONS PROVIDE INTERNET!!
WHEN PHOTONS PROVIDE INTERNET!!

Apr 6, 2021

Networking Ports — The communication endpoints

Port: In computer networking, a port is the communication endpoint. …

Networking

3 min read

Networking Ports — The communication endpoints
Networking Ports — The communication endpoints

Apr 1, 2021

TryHackMe: Linux Fundamentals Part 2 Walkthrough

Hello everyone, I welcome you all to the walkthrough for the Linux Fundamentals Part 2 Lab at TryHackMe. You can access this lab through the link given below: https://tryhackme.com/room/linux2 Task 1: Intro Read the above No answer needed Task 2: SSH-Intro Read the above No answer needed Task 3: Putty…

Tryhackme

2 min read

TryHackMe: Linux Fundamentals Part 2 Walkthrough
TryHackMe: Linux Fundamentals Part 2 Walkthrough

Mar 30, 2021

TryHackMe: Linux Fundamentals Part 1 walkthrough

Hello everyone, I welcome you all to the walkthrough for the Linux Fundamentals Part 1 Lab at TryHackMe. You can access this lab through the link given below: https://tryhackme.com/room/linux1 Task 1: Intro Read the above No answer needed Task 2: Methodology Read the above No answer needed Task 3: [Section…

Tryhackme

2 min read

TryHackMe: Linux Fundamentals Part 1 walkthrough
TryHackMe: Linux Fundamentals Part 1 walkthrough
Suraj Dhamak

Suraj Dhamak

IT Geek | Cyber Security | Coding

Following
  • Amanda Quint

    Amanda Quint

  • Abhishek Rath

    Abhishek Rath

  • Atharva Yadav

    Atharva Yadav

  • Anil Dash

    Anil Dash

  • Meena

    Meena

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable