TECHNOPHILE

Kali & Whonix: Perfect shadow for bug hunters and pen-testers

We all might have conscious about privacy. When I say privacy, I mean internet privacy. And when you think about… Read More

4 years ago

Why Burp Suite is the best proxy tool

This post is totally personal and not intended to make a comparison between proxy tools, moreover no intention of promoting… Read More

4 years ago

SSL/TLS for dummies part 4 – Understanding the TLS Handshake Protocol

In the 3rd part of the blog series Certificate Authorities were discussed in depth. If anyone is here without reading… Read More

4 years ago

SSL/TLS for dummies part 3 – Understanding Certificate Authority

In the second part of the series we have discussed about the SSL/TLS Key exchange in terms of Diffie Hellman… Read More

4 years ago

SSL/TLS for dummies part 2 – Understanding key exchange algorithm

In the last part of the blog series we have discussed about the basic concepts of cryptography. It includes Hashing,… Read More

4 years ago

SSL/TLS for dummies part 1 : Ciphersuite, Hashing,Encryption

As a security enthusiast, I always fond of the working of SSL (TLS these days). It took me days to… Read More

4 years ago

All about Robots – All you need to know about robots.txt

Today in this blog post we will discuss deeply about the Robot exclusion standard or simply robot.txt. Probably you know… Read More

4 years ago

Cookies for dummies Part 3: Understanding security flags – Secure, HttpOnly and SameSite

In the previous articles of this series we discussed basic concepts of cookies. How to view and edit cookies, types… Read More

4 years ago

Cookies for dummies Part 2: Third-party tracking cookie

In the first part of the series, we have discussed the basics of a cookie. Recollecting the main points from… Read More

5 years ago

Cookies for dummies: Part 1 basic concepts

When I started studying about web applications, one of the topics where I spent a hell lot of time was… Read More

5 years ago