Category: Guide

Cyber Security Simplified

Anonymity

VPN and Proxy Proxy server: proxy server is a dedicate computer or software running on a computer that acts as an intermediary between an endpoint device, such as computer, and another server from which a user or client is requesting a service. The proxy server may exists in the same machine as a firewall server…
Read more

test image

Web Hacking 2

CSRF on medium security Cross site request forgery is an attack that forces an end user to execute unwanted actions on a web applications in which they are currently authenticated. CSRF attack specifically target state changing request not the theft of data since the attacker has no way to see the response to the forged request.…
Read more

test image

Web Hacking

Setting up DVWA and Configuring database and user So, we will now install and configure the DVWA to do so we have to download dvwa zip file we have to go on www.dvwa.co.uk to download zip file After downloading unzip the file on desktop or any desired folder, rename this with any desired name like…
Read more

Complete Guide to Ethical Hacking

This Post Will Be Completed Soon…Contributors are invited for Articles, Posts, Photos, Videos, etcPlease Email us at contribute@phmcsecurities.org Introduction My Name is Sagar Bansal, and I am the Founder of PHMC SECURITIES, I met with Some Amazing People who also wanted to do exactly what i was planning to, and we Created this Free Guide……
Read more

Translate »
Help-Desk