#OWASP
Explore tagged Tumblr posts
Text
OWASP's LLM AI Security & Governance Checklist: 13 action items for your team

Artificial intelligence is developing at a dizzying pace. And if it's dizzying for people in the field, it's even more so for those outside it, especially security professionals trying to weigh the risks the technology poses to their organizations. That's why the Open Web Application Security Project (OWASP) has introduced a new cybersecurity and governance checklist for those security pros who are striving to protect against the risks of hasty or insecure AI implementations. https://jpmellojr.blogspot.com/2024/04/owasps-llm-ai-security-governance.html
#Checklist#OWASP#LLM#Security#Privacy#ThreatModeling#AIAssets#RiskManagement#Compliance#ModelCards#RAG#RedTeaming#Challenges#Prioritization
2 notes
·
View notes
Text
An Overview of Burp Suite: Acquisition, Features, Utilisation, Community Engagement, and Alternatives.
Introduction:
Burp Suite is one of the strongest web application security testing software tools used by cybersecurity experts, as well as ethical hackers. PortSwigger created Burp Suite, which provides potent scanning, crawling, and exploiting tools for web application vulnerabilities.
What is Burp Suite?
Burp Suite is one of the tools to conduct security testing of web applications. It assists security testers in detecting vulnerabilities and weaknesses like SQL injections, XSS, CSRF, etc.
Steps in Obtaining Burp Suite
Burp Suite is available for download on the PortSwigger official website. It is available in three versions:
Community Edition (Free)
Professional Edition (Subscription-Based)
Enterprise Edition (For Organisations)
Important Tools in Burp Suite
Proxy â Captures browser traffic
Spider â Crawls web application content
Scanner â Scans automatically for vulnerabilities (Pro only)
Intruder â Performs automated attack activities.
Repeater â Manually send requests.
Decoder â Translates encoded data.
Comparer â Compares HTTP requests/responses
Extender â Allows extensions through the BApp Store
How to Use Burp Suite
Set your browser to use Burp Proxy.
Capture and manipulate HTTP/S requests.
Utilise tools such as Repeater and Intruder for testing.
Scan server responses for risks.
Export reports for audit purposes.
Burp Suite Community
Burp Suite has a highly engaged worldwide user base of security experts. PortSwigger Forum and GitHub repositories have discussions, plugins, and tutorials. Many experts are contributing through YouTube, blogs, and courses.
Alternatives to Burp Suite
If you're searching for alternatives, then look at:
OWASP ZAP (Open Source)
Acunetix
Netsparker
Nikto
Wfuzz
Conclusion:
Burp Suite is widely used for web application security testing. Mastery of Burp Suite is one step towards web application security for both novice and professional ethical hackers.

#BurpSuite#CyberSecurity#EthicalHacking#PenTesting#BugBounty#InfoSec#WebSecurity#SecurityTools#AppSec#OWASP#HackingTools#TechTools#WhiteHatHacker#CyberTools#BurpSuiteCommunity#NetworkSecurity#PortSwigger#WebAppTesting#SecurityScanner#CyberAwareness
0 notes
Text
Top API Security Challenges in 2025 and How to Overcome Them
Explore the leading API security threats of 2025 and discover best practices to safeguard your applications against evolving cyber risks.
0 notes
Text
youtube
0 notes
Text
1 note
·
View note
Text
How to use OWASP Security Knowledge Framework | CyberSecurityTV
youtube
Unlock the secrets of cybersecurity with our latest video on using the OWASP Security Knowledge Framework! ðĄïļðŧ Join CyberSecurityTV as we dive deep into practical tips and techniques to enhance your security game. ð From threat modeling to secure coding practices, this video has it all! ïŋ―ïŋ―ïŋ― Don't miss out on this valuable resource for strengthening your defenses against cyber threats. Watch now and level up your cybersecurity expertise!
#OWASP#Cybersecurity#SecurityKnowledgeFramework#InfoSec#SecureCoding#ThreatModeling#OnlineSecurity#ITSecurity#CyberAware#HackProof#Youtube
0 notes
Text
youtube
ZAP Active Scan | CyberSecurityTV
ðZAP is an open-source proxy tool for the penetration testing. One of the most useful features is the active scan using the OWASP ZAP. It is very important to know how to configure form-based authentication and scan all the relevant pages.
#ZAPActiveScan#OWASP#ApplicationSecurity#CyberSecurity#VulnerabilityScanning#WebApplicationScanning#PenetrationTesting#NetworkSecurity#SecureSoftware#WebSecurity#SecureDevelopment#Youtube
0 notes
Text
Best Practices for Writing Secure Codes for Mobile Apps

Writing Secure Code is Vital for an app developer. There have been numerous encounters with apps that were hacked and leaked private user's information. An app developer needs to be aware of the possible threats in the cyber world. Develop/ Write Codes that are up to mark to ensure security. You must have complete knowledge of the potential dangers only then precautions can be taken to reduce those risks. While you are developing an app/ software, Mobile app security or user's device security should be the priority.
 The best practices for writing secure code for mobile app security.
HTTPS (Hypertext Transfer Protocol Secure)
Hypertext Transfer Protocol Secure is a secure and traditional method to transport data from a web browser to a website. HTTPS is categorised as the safer version of HTTP. It is a combination of HTTP and TLS or SSL protocol. HTTPS makes sure that the communication is completely encrypted. Encrypted communications ensure that no one knows what you are talking about online, or what you are searching for.
HTTPS Encrypted Codes beat network sniffing attacks by obscuring the web trafficâs meaning from everyone. The traffic is seen by the hacker, but it emerges as the rush of random bytes instead of text form of HTML, links, cookies, passwords, XML or JSON body. Mobile app developers must use HTTPS-encrypted codes and abstain from using HTTP links.
 Different Channels of Communication.
Mobile app developers should not use only one channel of communication for security. By using just one channel of communication, it gets easier for hackers to perform malicious activity. Therefore It is best to use different communication channels for sharing private information like passwords, OTP's or PINs. You can use GCM, SMS or APNS to share OTPs or PINs.
 Validation of SSL Certificates.
An SSL certificate allows websites to use HTTPS codes. Purchase an SSL certificate from an authentic provider. SSL certificates are a verification of your authenticity in the web world. Nowadays, it is easier to fake identity and pretend to be someone you are not.Â
 List of Secure Coding Practices by OWASP
Memory Management
Input Validation
File Management
Output Encoding
Database Security
General Coding Practices
Error Handling & Logging
Data Protection
Communication Security
AuthenticationÂ
Password Management
Verify Data
Inspecting the originality of the file and data transported between the mobile app and server is essential to the mobile appâs security. Applying hash functions can enhance security. Checking the data and using different modes of communication to deliver the hash functions.
Writing Codes
Adopting best practices for writing secure code is necessary for secure mobile app development. By prioritizing Security while developing a mobile app, you can tackle potent cyber risks and Ensure the data is safe.Â
0 notes
Text
āļĄāļēāļāļĢāļ§āļāļŠāļāļāļāđāļāļāđāļŦāļ§āđāļāđāļ§āļĒ OWASP ZAP āļāļąāļ
OWASP ZAP (Zed Attack Proxy) āđāļāđāļāđāļāļĢāļ·āđāļāļāļĄāļ·āļāļāļĩāđāđāļāđāļŠāļģāļŦāļĢāļąāļāļāļēāļĢāļāļāļŠāļāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļāļāđāļāļāļāļĨāļīāđāļāļāļąāļāđāļ§āđāļ āđāļāļĒāļŠāļēāļĄāļēāļĢāļāđāļāđāļāļēāļāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāđāļāļāđāļŦāļ§āđāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāđāļēāļāđ āļāļĩāđāļāļēāļāđāļāļīāļāļāļķāđāļāļāļąāļāđāļ§āđāļāđāļāļāļāļĨāļīāđāļāļāļąāļ āđāļāļāļĢāļāļĩāļāļĩāđāļāļļāļāļāđāļāļāļāļēāļĢāļāļāļŠāļāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļāļāđāļ§āđāļāđāļāļāļāļĨāļīāđāļāļāļąāļāļāļāļāļāļļāļāļāđāļ§āļĒ OWASP Zap āļāļĩāđāļāļ·āļāļāļąāđāļāļāļāļāļāļĩāđāļāļļāļāļŠāļēāļĄāļēāļĢāļāļāļģāļāļēāļĄāđāļāđ āļāļēāļ§āļāđāđāļŦāļĨāļ OWASP Zap āđāļāđāļāļēāļāđāļ§āđāļāđāļāļāđāļāļāļ OWASP āļāļĩāđ https://www.zaproxy.org/download/ āđāļĢāļīāđāļĄāļāđāļāđāļāđāļāļēāļ OWASP ZapâĶ
View On WordPress
#āļāđāļāļāđāļŦāļ§āđāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ#āļŠāđāļāļāļāđāļāļāđāļŦāļ§āđ#OWASP#OWASP TOP 10#va#Vulnerability Assessment#Zed Attack Proxy
0 notes
Text
OWASP ZAP: Tu Escudo Invisible contra las Amenazas Web
Imagina tu sitio web como un castillo medieval. Los hackers son los invasores que buscan cualquier brecha para acceder a tus valiosos datos. OWASP ZAP (Zed Attack Proxy) es como un ejÃĐrcito de guardias virtuales, vigilando cada rincÃģn de tu castillo digital y detectando cualquier amenaza antes de que cause daÃąos. En este artÃculo, desentraÃąaremos los misterios de esta poderosa herramienta y teâĶ
0 notes
Text
Chat Playground project lets security teams toy with gen AI

Explore OWASP's Chat Playground, an interactive tool to test AI security, experiment with LLMs, and understand prompt injection attacks. https://jpmellojr.blogspot.com/2025/06/chat-playground-project-lets-security.html #OWASP #ChatPlayground #AISecurity
0 notes
Text
Owasp top 10 - parte 1
Hoje eu resolvi fazer o pacote owasp top 10 que estÃĄ dentro do Tracks no hack the box. Para iniciar eu escolhi uma mÃĄquina com base na dificuldade, entÃĢo a mais fÃĄcil parecia ser a sanitize.
1- Sanitize
Ao ligar vai instanciar a mÃĄquina e ao acessar o Ip, vocÊ verÃĄ uma tela de login:
Como nÃĢo sabemos usuÃĄrio nem nada, eu costumo colocar qualquer coisa sÃģ para ver o que acontece, nesse caso coloquei admin, admin, e retornou uma string sql:
Com isso ficou meio Ãģbvio que ÃĐ um sql injection.
Ao testar o mais padrÃĢo possÃvel tivemos um erro:
ok, fui pesquisar um pouco sobre o sqlite3, e ao testar o Payload: ' or 1=1/* deu certo:
2- baby BoneChewerCon
Esse foi meio, meio, nada a dizer kk. Bom ao iniciar a instÃĒncia vocÊ receberÃĄ um ip e porta, e ao acessar, teremos a seguinte pÃĄgina:
Ao digitar qualquer coisa e clicar no register me, teremos um erro:
E ao descer a pÃĄgina temos a flag:
à importante ler atÃĐ o final.
3- Full Stack Conf
Ao acessar o ip e porta ÃĐ engraçado que o nome ÃĐ xss:
E temos a pÃĄgina:
Ao rodar a pÃĄgina atÃĐ o final temos:
como ele fala, pop up an alert to get the flag, entÃĢo ao colocar o payload: <script>alert("qualquercoisa")</script>
temos a flag:
Linkedin: Luana
htb: moominLua

1 note
·
View note
Text
Web Application Penetration Testing, API Application Security Testing | BlackLock
Looking to get Web Application Penetration Testing services in NZ? BlackLock offers API application penetration testing services. Contact us now!
#Web application penetration testing#Cybersecurity New Zealand#Vulnerability assessment services#Penetration testing providers#OWASP compliance testing
0 notes
Text
youtube
0 notes
Text
1 note
·
View note
Text
1 note
·
View note