Joshua Arulsamy

@joshuaarulsamy

140 Points 0 Followers

5 Posts

0 Answers

User has not added any information in their about section.

Joshua Arulsamy · 2 years ago

IEEE is Vulnerable , 18 Year Old Finds a bug on IEEE CHINA!!!!!!

Description Reflected XSS attacks occur when a malicious script is reflected off of a web application to the victim's browser. The script is activated through a link, which sends a request...

Joshua Arulsamy · 2 years ago

What is a 4-Way Handshake ?

The 4-way handshake is the process of exchanging 4 messages between an access point (authenticator) and the client device (supplicant) to generate some encryption keys which can be used to e...

Joshua Arulsamy · 3 years ago

What is a DDoS Attack?

What is a DDoS Attack? DDoS stands for distributed denial of service but is often referred to as a simple denial of service. A DDoS attack consists of a website being flooded by requests dur...
4

Joshua Arulsamy · 3 years ago

How Do You start Your Journey as an Ethical Hacker?

I am currently a security researcher. I am still learning every day and would still consider myself a newbie in cybersecurity. I am writing this based on my experience so far. These are my v...
4

Joshua Arulsamy · 3 years ago

Do you Like honey , Then what about a honeypot?

Honeypot refers to a security structure that is built to deflect the attackers. In other words, a honeypot is there to distract the attackers from valuable assets of the organization . Simil...

Loading More Content