FazalinStackademicImplementing Role-Based Access Control using CASLHey everyone, I’m back to blogging after a year I guess! I have started Working in a software company managing security and handling MERN…Jul 14Jul 14
FazalConfiguring Aws CLI for security testing!Hello fellas it’s been long since I blogged. I have been working on some personal building and giving my time to do bug bounty now I gonna…Jul 18, 2022Jul 18, 2022
FazalBasic concepts of OOP!Hey buddy, It’s been a long since I blogged and I wrote this cool blog in a selfish to make me understand the OOP concepts and I hope you…Feb 26, 2022Feb 26, 2022
Fazal#10 Insufficient Logging and Monitoring — Security BasicsThe best-case scenario for an attacker is if attacks on an application can go unnoticed as this would give the confidence to carry out…Feb 2, 2021Feb 2, 2021
Fazal#9 Using Components With Known Vulnerability — Security BasicsWhat is Using components known vulnerabilities ?Jan 31, 2021Jan 31, 2021
Fazal#7 Security Misconfiguration — Security BasicsIn this blog we are going to learn about the security misconfiguration from the OWASP top 10 .we are learning this from past month and…Jan 30, 2021Jan 30, 2021
Fazal#6 Broken Access Control — Security BasicsBefore we talk about Broken Access Control, let’s get to grips with Access Control.Jan 30, 2021Jan 30, 2021