ඔබ තවමත් Widane Forums සාමාජිකයෙක් නෙවෙයි ද..?

Widane Forums හි සියළුම ලිපිවල ඇති සියළුම Links වෙත පිවිසීමට නම් ලියාපදිංචිවීම අනිවාර්යයි.
ඔබගේ සියලුම තාක්ෂණික ගැටළු සඳහා විසඳුම් සොගැනීමට වගේම දැනුම බෙදාගැනීම සඳහා මෙහි ඉඩකඩ වෙන්කර තිබෙනවා.
ඉතින් ඇයි තවත් බලාගෙන ඉන්නේ ඉක්මනින් ලියාපදිංචිවී ඔබගේ දැනුම වැඩිකරගන්න.

Register Here




[Question] What is the difference between..
#1
Tongue 
What is the difference between security researching and penetration testing?


......................
.........................
..........................
Damn.. There's a little bit of devil in her angel eyelove love

#2
bumpy
Reply
#3
Still waiting ✳️
Damn.. There's a little bit of devil in her angel eyelove love

Reply
#4
pentesting kiyanne mokk hari computer system ekaka vulnerabilities hoyana eka.
meka balanna:

[To see links please login or register here]


security research kiwwama namema thiyanawane mokkda kiyala. security gana eka eka dewal gana hoyala balala igena ganna eka

Anøn LK 
(Admin & Moderate Officer)

Widane Forums
Contact Me: [email protected]
Admin Queries: [email protected]
General Queries:

[To see links please login or register here]

 
1
Reply
#5
oya dekama ithin ekata thama karanne bn
1
Reply
#6
මම මේ ප්‍රශ්නෙ උපුටා ගත්තෙ ඔසඳගෙ (හැමෝම දන්නව කවුද කියල) බ්ලොග් එකෙන්. මේක හැමෝම දැනගන්න ඕන නිසයි මම ත්‍රෙඩ් එකක් විදියට දැම්මෙ. මේ තියෙන්නෙ උපුටා ගැනීමක්. ඔසඳ කියන්න හදන දේ හැමෝටම තේරෙයි කියල හිතමු.

*What is the difference between security researching and penetration testing?

To explain in my own terms, penetration testing uses automated tools and the goal is to test the security by penetrating like an attacker and to find maximum number of loop holes by providing proof of concepts. For that you need higher permissions to scan, do vulnerability assessments and to exploit. But security researching is not firing up tools like kids and tools can find only the standard vulnerabilities which are very common. Researching is very beautiful, sometimes I end up bypassing things, finding logical issues, it is something like that. I just study the application well, how the application interacts with the end-user and come up with different ideas to fuzz. I don’t use any vulnerability scanning tools as the owners of these organizations can do it and we don’t need to bother about it. Sometimes in researching you may find different kind of vulnerabilities in which sometimes hard to find the root cause. From my experience I am telling this. Recently I found a XSS and a possible SQLi in a very famous CMS, even though it had very tight filters a small error led me to these vulnerabilities as a result of fuzzing. Likewise fuzzing can lead to many findings.

- osandamalith.com
Damn.. There's a little bit of devil in her angel eyelove love

Reply




Users browsing this thread: 1 Guest(s)