hackingmantra-blog
hackingmantra-blog
Hack-Learn-Earn
43 posts
Don't wanna be here? Send us removal request.
hackingmantra-blog · 5 years ago
Photo
Tumblr media
✅Online scam are various approaches of Fraud, encouraged by cybercriminals on the Internet. ✅The principle motivation behind these sorts of tricks can go from credit card theft, capturing client login and password credentials and even data fraud.   
0 notes
hackingmantra-blog · 5 years ago
Text
Online Scam
Tumblr media
✅Online scam are various approaches of Fraud, encouraged by cybercriminals on the Internet. ✅The principle motivation behind these sorts of tricks can go from credit card theft, capturing client login and password credentials and even data fraud. 
0 notes
hackingmantra-blog · 5 years ago
Photo
Tumblr media
✅Data Encryption used to protect digital data confidentially which is stored in computer systems. ✅ Passed on using the internet or other computer networks. ✅It provides data privacy which is in unreadable format that is only be accessed by its authorised users.
0 notes
hackingmantra-blog · 5 years ago
Photo
Tumblr media
Data encryption is a method to secure data at the time of transmission in a network keeping the data in unreadable format through this the hackers cannot decrypt the data like this we can protect our data.
0 notes
hackingmantra-blog · 5 years ago
Text
Encryption algorithm is used when you are transmiting the data(request and response) bt hash algorithm is used when you are storing the data in database.
Tumblr media
0 notes
hackingmantra-blog · 5 years ago
Photo
Tumblr media
VAPT Audit tools Best Security Infiltration Testing Instruments that every Security analyzer should know NETSPARKER ACUNETIX W3af Sqlmap Spyse Retina Wireshark Nessus Probely
0 notes
hackingmantra-blog · 5 years ago
Photo
Tumblr media
VAPT increases ROI on it security VAPT is an on-demand arrangement which makes it helpful to run tests over the internet. It is a hybrid solution that mixes computerized testing with security master examination and Increased ROI on IT security.
0 notes
hackingmantra-blog · 5 years ago
Text
Tumblr media
Children are like buds in a garden and should be carefully and lovingly nurtured, as they are the future of the nation and the citizens of tomorrow. There can be no keener revelation of a society's soul than the way in which it treats its children.
.
#hackingmantra #cybersecuritybbsr #trainingbbsr #childrensday
0 notes
hackingmantra-blog · 5 years ago
Text
Tumblr media
✅Source Code is a collection of computer instructions written using a human-readable programming language
✅Object Code is a sequence of statements in machine language, and is the output after the compiler converts the Source Code.
#hackingmantra #sourcecode #objectcode #cybersecurity #trainingbbsr
0 notes
hackingmantra-blog · 5 years ago
Text
Tumblr media
✅A decompiler is a computer program that takes an executable file as input, and attempts to create a high level source file which can be recompiled successfully.
#hackingmantra #trainingbbsr #decompilier #cybersecuritybbsr
0 notes
hackingmantra-blog · 5 years ago
Text
Tumblr media
✅Reverse engineering is the process by which a human-made object is deconstructed to reveal its designs or to extract knowledge from the object
#hackingmantra #trainingbbsr #reveseengineering #cybersecuritybbsr
1 note · View note
hackingmantra-blog · 5 years ago
Text
Tumblr media
✅One benefit of a bug bounty program is that it is continuous testing. A penetration test is typically a one-time assessment of your security at a point in time.
✅The Downsides to Bug Bounty program is it indiscriminately attract the attention of both blackhat and whitehat hackers.
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #bughunting #technology
0 notes
hackingmantra-blog · 5 years ago
Text
Tumblr media
✅Different methods of bug bounty
1. OWASP Testing method
2. Penetration Testing
3. Jhaddix Bug Hunting Methodology
✅For mobile application bug hunting
1. iOS Application Security
2. Owasp Mobile AppSec
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #bughunting
0 notes
hackingmantra-blog · 6 years ago
Text
Tumblr media
✅To become a bug bounty you have to have a knowledge of these topics
✅Cross-site scripting (XSS)
✅SQL Injection
✅Business Logic
✅Information Gathering
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #bughunting
0 notes
hackingmantra-blog · 6 years ago
Text
Tumblr media
✅Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
✅Bug bounty program is offered by many websites and software developers can receive recognition and compensation for reporting bugs
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #cybersecurity
0 notes
hackingmantra-blog · 6 years ago
Text
Tumblr media
✔️In freelancing if you spent almost 2–3 days doing freelancing I used to get around $100
✔️ If you got a bug in any bug hunting website within 300 seconds, which gave me $100. The choice is yours that work for 2 - 3 day and get $100 OR get the same in 300 seconds (5 mins)
#cybersecuritybbsr #trainingbbsr #hackingmantra #bugbounty #bughunting
0 notes
hackingmantra-blog · 6 years ago
Text
Tumblr media
✅VMWARE: This industry-leading virtualization software provider needs little introduction, as its products and solutions have paved the way for a generation of virtualization technologies. ✅DOCKERS: The Docker project’s main intent is to allow developers to create, deploy, and run applications easier through the use of containers. Clearly—for DevOps and CI/CD initiatives—application portability and consistency are crucial needs that Docker fulfills quite nicely.
0 notes