Open in app

Sign In

Write

Sign In

Prince Prafull
Prince Prafull

59 Followers

Home

About

May 2

How I found Reflected XSS on *.GOV.IN

This blog will help you find all the vulnerable parameters in any web application. It will also teach you how to exploit vulnerabilities like XSS and SQLI by approaching any website. What is Reflected XSS: Reflected cross-site scripting (or XSS) is a security vulnerability that occurs when an application receives data in an HTTP…

Web Application Testing

3 min read

How I found Reflected XSS on *.GOV.IN
How I found Reflected XSS on *.GOV.IN
Web Application Testing

3 min read


Mar 19

Malware Analysis Using ProcDot

Malicious software, sometimes referred to as malware, is examined and understood through the process of malware analysis. When malware is used by hackers to access computers without authorization, steal valuable information, or harm computer systems, this technique is crucial to recognizing and mitigating cyber risks. There are primarily 2 types…

Cybersecurity

5 min read

Malware Analysis Using ProcDot
Malware Analysis Using ProcDot
Cybersecurity

5 min read


Nov 8, 2022

DNS Traffic: Do Not Skip

Brief about DNS: DNS translates Domain names to IP addresses so that web browser can load the required website. While analysing any network traffic always remember to see DNS query that were visited in the network because in DNS shows all the websites visited. Your Setup: Wireshark (recommended) https://mega.nz/file/JqIDQQIR#ybZVdUJLte8BJmFZ3s2mJF3gNPj5CubsrYiA429xfns …

Network Security

3 min read

DNS Traffic: Do Not Skip
DNS Traffic: Do Not Skip
Network Security

3 min read


Nov 6, 2022

What Network Says!! — Analyse Traffic

What we need to find: One suspicious service is active on the network find that? Port number of that suspicious service? Our Lab: Wireshark (recommended) SAMPLE: https://mega.nz/file/o34CASjA#0qB-J_r_0jfaadXcoU_JZSMkpEd9JUxI_hP_Q6CxOBo Lets know basic Protocols: TCP UDP HTTP ARP DNS Lets Start with TCP: Put tcp filter in wireshark:

Networking

2 min read

What Network Says!! — Analyse Traffic
What Network Says!! — Analyse Traffic
Networking

2 min read


Nov 2, 2022

My Methodology to Analyse Ram Dump

Test Case Description: This Ram dump of a computer which is under attack and attacker is accessing it with reverse TCP connection. Answer of these following question we have to find? Name of malicious process and its Process ID? Malicious payload’s Reverse IP and port number? Testing the Virus on online sandbox and…

Cybersecurity

3 min read

My Methodology to Analyse Ram Dump
My Methodology to Analyse Ram Dump
Cybersecurity

3 min read


Jul 11, 2021

Prevent From Spoofed Emails

Hello Readers, You might have spoofs of films many times, nut have you heard about email spoof? A spoof film may look like actual movie or something inspired from it but Email spoofing is different. EMAIL SPOOFING: Email spoofing is a technique in which Hacker / Attacker sent malicious payload…

Email

3 min read

Prevent From Spoofed Emails
Prevent From Spoofed Emails
Email

3 min read


Jun 30, 2021

Some Sections of IT Act all must Know

Hello Readers, In this blog, we’ll talk about some of the most important Sections of Indian IT Act. An average Indian spends 6 to 7 hours per day on internet, this makes us, our identity and our personal position vulnerable to invasion and violation. …

It Act

2 min read

Some Sections of IT Act all must Know
Some Sections of IT Act all must Know
It Act

2 min read


Jun 26, 2021

How to Secure your Personal Network

Hello Readers, Every person nowadays is connected to internet. Internet has become a necessity in this global world. No doubt, the more active internet user you are, the more knowledge and interaction you have with the outer world. …

Secure

2 min read

How to Secure your Personal Network
How to Secure your Personal Network
Secure

2 min read

Prince Prafull

Prince Prafull

59 Followers

Cyber Security Learner | Web Application Testing | Student

Following
  • Craig Hays

    Craig Hays

  • Vickie Li

    Vickie Li

  • Igor S. Bederov

    Igor S. Bederov

  • Thexssrat

    Thexssrat

  • Dushinka Choudhary

    Dushinka Choudhary

See all (11)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams