0rgis Blog

Just another blog

Firstly, individuals need to be aware of the risks that come with being online. The use of social media, online shopping, and mobile banking has made our personal information more accessible than

PTES Methodology Explained

- Posted in Uncategorized by

Penetration testing is an important part of any organization's security posture. It involves attempting to exploit vulnerabilities in a system to identify potential security risks. The Penetration

OWASP Top 10

- Posted in Uncategorized by

In this blog post, we'll cover the latest version of the OWASP Top 10, which is a list of the top 10 most critical web application security risks. The latest version, released in 2021, reflects

Hydra Tool

- Posted in tools by

Hydra is a powerful password cracking tool that can be used to test the strength of various protocols and login pages. It can be used for both ethical hacking and penetration testing purposes to
Nessus Scanner: A Powerful Tool for Securing Networks and Systems In today's digital age, securing networks and systems is more important than ever. Cyber threats are on the rise, and organizations

BAC - Broken Access Control

- Posted in Uncategorized by

Broken Access Control (BAC) is a common security vulnerability that can occur in web applications. It happens when a system does not properly enforce restrictions on what users can access or perform.
Port Knocking: An Extra Layer of Security for Network Services Introduction: In today's world, security is of utmost importance when it comes to protecting network services from unauthorized access.

OSSTMM Methodology

- Posted in Uncategorized by

OSSTMM Methodology The Open Source Security Testing Methodology Manual (OSSTMM) is a comprehensive framework for performing security testing and assessment of systems and applications. It provides a