Basics of Burp Suite for identifying vulnerabilities and verifying attack vectors for web-based applications Part-1

DISCLAIMER  This tutorial is only for Educational purposes. Please don’t use these kind of attacks for unethical purposes. Burp or Burp Suite is an integrated platform for performing security testing of web applications. Information security professionals use Burp to identify vulnerabilities and verify attack vectors for web-based applications. The framework is written in Java and developed by PortSwigger Security. … Continue reading Basics of Burp Suite for identifying vulnerabilities and verifying attack vectors for web-based applications Part-1

The Security Value of the robots.txt file

DISCLAIMER This tutorial is only for Educational purposes. Please don't use these kind of attacks for unethical purposes. The "robots.txt" file is one of the primary ways of telling a search engine where it can and can't go.This is called the robots exclusion protocol. The robots.txt file is read by search engine spiders.The first thing … Continue reading The Security Value of the robots.txt file