File Inclusion Attack ExplainedFile inclusion attacks, also known as remote file inclusion (RFI) or local file inclusion (LFI) attacks, are a type of vulnerability that…Dec 30, 2022Dec 30, 2022
JMeter — Response AssertionResponse assertion in Apache JMeter is a powerful tool that allows you to verify the content of the server response during a load test…Dec 29, 2022Dec 29, 2022
OTP extraction from Respose in JMeterHere is a step-by-step guide on how to extract an OTP (One-Time Password) from a response using the Boundary Extractor in JMeter:Dec 29, 2022Dec 29, 2022
Installing Certificate in Android [Root required]To capture HTTPS traffic from android app, make sure the android is rooted, and the JMeter certificate is transferred to the device.Dec 27, 2022Dec 27, 2022
Installing Certificate in iPhone without any softwareHere are the steps to follow to install a CA (Certificate Authority) certificate on an iPhone:Dec 27, 2022Dec 27, 2022
JMeter Tutorial — AuthenticationIn this tutorial, we will go through the steps of creating a simple test plan in JMeter to test the signup and login functionality of a…Dec 23, 2022Dec 23, 2022
JMETER Tutorial — Script RecordingTo carry out Load/Performance testing on any web-app, first, the tester has to understand the traffic communication of the web-app and the…Dec 23, 2022Dec 23, 2022
Basics of SQL InjectionHi reader! In this post, we are going to discuss over an important topic, SQL Injection.Nov 28, 2022Nov 28, 2022