PinnedSabuj Kumar ModakBypassed the OTP verification process using “Turbo Intruder” Extension.Today, in this article, we will explore methods and techniques that have been used to bypass OTP.May 202May 202
Sabuj Kumar ModakA Day in the Life of a QA Engineer: My Daily RoutineAs a Software QA Engineer, my day revolves around ensuring quality, functionality, and security in our software applications. Here’s a…Oct 28Oct 28
Sabuj Kumar ModakUI Testing Techniques: A Comprehensive Guide for Ensuring Seamless User ExperienceUser Interface (UI) testing is crucial for delivering a flawless user experience in any web or mobile application. Effective UI testing…Oct 8Oct 8
Sabuj Kumar ModakStep-by-Step Guide to API Testing Using PostmanAPI Testing Using Postman- Implemented CRUD Operations with Express.js, MongoDB, and Node.js provides a detailed guide on how to use…Jul 13Jul 13
Sabuj Kumar ModakCSRF Vulnerabilities: How to Exploit and Defend Against AttacksToday, in this article, we will explore a comprehensive guide to CSRF exploitation and prevention. Cross-Site Request Forgery (CSRF) is a…May 252May 252
Sabuj Kumar ModakAPITesting Using PostmanPostman, a highly popular tool for API development and testing, facilitates the process of sending requests to APIs and receiving their…Nov 20, 2023Nov 20, 2023
Sabuj Kumar ModakSecurity Assessment of an Online Judge Web ApplicationAbstract: A website is a compilation of web pages and related material that is accessible through a single domain name and made available…Jul 26, 2023Jul 26, 2023
Sabuj Kumar ModakCTF Adventure Begins: Roadmap and Top Websites to Boost Your SkillsIf you’re passionate about cybersecurity and love a good challenge, then Capture the Flag (CTF) competitions are the perfect way to test…Jun 24, 2023Jun 24, 2023
Sabuj Kumar ModakSafeguarding Digital Assets: The Shield of CybersecurityIn the digital age, protecting valuable assets from cyber threats is paramount. Explore how cybersecurity serves as an impenetrable shield…Jun 19, 2023Jun 19, 2023