Facebook App Development with OAuth 2.0

What is OAuth (Open Authorization), and how it works? OAuth allows notifying a resource provider (e.g. Facebook) that the resource owner (e.g. you) grants permission to a third-party (e.g. a Facebook Application) access to their information (e.g. the list of your friends). You can use OAuth to get a token via a callback url and … Continue reading Facebook App Development with OAuth 2.0

Web Security Dynamic Analyses with OWASP ZAP

What is Dynamic Security analysis ? Dynamic application security testing (DAST) is examine the security application in the running sate and trying to poke it and prod it in unexpected ways in order to discover security vulnerabilities.[1] What is OWASP Zap ? The OWASP Zap attacking proxy is one of the most popular free security … Continue reading Web Security Dynamic Analyses with OWASP ZAP

Static Code analysis

What is Static Code analysis  Static Code analysis(Source code analysis) is usually performed as part of Code review and carried out at the software implementation phase of a Secure Software Development life Cycle (Secure SDLC).Static code analysis falls under white Box testing when considering  different type of the testing approaches.Static code analysis commonly refer to running … Continue reading Static Code analysis

Introduction to forensics & Lab 01

Computer Forensics Definitions "A methodical series of techniques and procedures for gathering evidence,from computing equipment and various storage devices and digital media,that can be presented in a court of law a coherent and meaningful format "                                       … Continue reading Introduction to forensics & Lab 01

Introduction to penetration Testing

What is penetration testing? Penetration testing ,often called “pentesting”,”pen testing”,is the practice of attacking your or your client's IT Systems and infrastructure in the same way hacker would identify the security holes but without actually  harming the System. The person carrying out pentartion test is called a penetration tester or pentester. IMPORTANT: Penetration require to … Continue reading Introduction to penetration Testing