Ashwini PuranikIntroduction to Internal Protocols in Hardware DevicesWhat is Protocol: A set of rules and regulations is called a protocol.6 min read·Feb 22, 2024----
Ashwini PuranikIntroduction to Rapid Reset VulnerabilityWhat is “Rapid Reset” vulnerability?3 min read·Oct 13, 2023----
Ashwini PuranikAWS Cloud Penetration Testing (Basic Test cases and Tools)AWS customers are welcome to carry out security assessments or penetration tests of their AWS infrastructure without prior approval for the…5 min read·Oct 6, 2023----
Ashwini PuranikInsecure DeserializationIntroduction to Insecure Deserialization Vulnerability5 min read·Mar 27, 2023----
Ashwini PuranikRace Condition VulnerabilityWhat is Race Condition Vulnerability ?5 min read·Aug 25, 2022----
Ashwini PuranikIntroduction to Security Architecture ReviewThis blog is about introduction to “Security Architecture Review”. In short why it is used, in which phase it is used, and what are…9 min read·Feb 6, 2022----