PinnedYasir AnsariHow I became a Pen-tester /Bug bounty HunterThis is why I am in CyBer SeCurity FieLds.I worked as a Web design and developer at first. In 2012, I departed for Singapore for my career…2 min read·Dec 16, 2020----
Yasir AnsariConfiguring Burp Suite With Latest Android VersionHello Hacker…1 min read·Feb 19, 2021----
Yasir AnsariConsequences of SQL injection attacksSQL injection attacks pose a serious security threat to organizations. A successful SQL injection attack can result in confidential data…1 min read·Feb 17, 2021----
Yasir AnsariImportant of web penetration testingWeb penetration testing is an important tool that is used by security professionals to test the integrity of web-facing cyber assets and…1 min read·Feb 12, 2021----
Yasir AnsariSix important security concepts that should be considered during the web application development…1 min read·Feb 12, 2021----
Yasir AnsariXSS Attack ConsequencesThe consequence of an XSS attack is the same regardless of whether it is stored or reflected (or DOM Based). The difference is in how the…1 min read·Feb 12, 2021----
Yasir AnsariWhat can an XSS attacker do?Generally speaking, if an attacker manages to perform an XSS attack, he could be able to basically do one or more of the following:2 min read·Feb 12, 2021----
Yasir AnsariHow to Determine If You Are VulnerableXSS flaws can be difficult to identify and remove from a web application. The best way to find flaws is to perform a security review of…1 min read·Feb 12, 2021----
Yasir AnsariWhat do We Need to Know to do bug bounty?This is all about sharing what I learn…2 min read·Feb 12, 2021----