Category Archives: All Posts

Testing for WebSockets security vulnerabilities

In this section, I’l explain how to manipulate WebSocket messages and connections, describe the kinds of security vulnerabilities that can arise with WebSockets, and give some examples of exploiting WebSockets vulnerabilities. WebSockets WebSockets are widely used in modern web applications. They are initiated over HTTP and provide long-lived connections with asynchronous communication in both directions….

Read More

How to configure SoftEther VPN on Ubuntu 20.0 LTS

Now if you have read my previous post on “How to Setup SoftEther VPN on Ubuntu 20.0 LTS” and have installed SoftEther VPN, then in this post you will find information How to configure SoftEther VPN. So, let’s get started. Open your Terminal and login to your server with root user or by becoming root…

Read More

How to Setup SoftEther VPN on Ubuntu 20.0 LTS

With all the COVID-19 pandemic data thieves have become more active in stealing data and also many companies would like to know more about you or what you do by adding a tracer to Smartphone/Pad applications. Of course, some people have nothing to hide, but it is more a question of principle do you want…

Read More