Image

About the author

Komal Bhosale is BE, MBA graduate. Komal has experience in teaching as well as in VAPT. Are you really interested in my Resume? I really don't think so. The questions you might have are like.... Why sudden change of profession from a Assistant Professor to Cybersecurity Professional. How I got into this profession?

The answer is "by accident". My college sent me to a FDP Faculty Development Program on Cybersecurity. There I met with a lot of professionals from security. At that time I got introduced to the "World of Cybersecurity".

After the FDP I decided to learn as much as I could about Hacking and Internet security, and read most everything on the subject that I could get my hands on at the time. It’s an obsession that hasn’t let up.

The world of cybersecurity is never a dull one. Thousands of news and articles about the latest trends in technology are published every day, it’s almost impossible to catch up. In a sea of tech blogs claiming to feature relevant news and engaging topics, I understand if you’re having a hard time choosing one. So I have created a blog for you. Better way to learn things is to teach others as well.

Image

Bugbounty for beginner

Bugbounty is a reward offered to a person who identifies an vulnerability in a computer program or system.

Read More
Image

OWASP Top 10

The OWASP Top 10 is a standard awareness document for developers and web application security.

Detail
Image

Kali Linux

Kali Linux is Debian-based Linux distribution aimed at Penetration Testing & Security Auditing.

Read More

Burp Suite

Burp Suite Professional is one of the most popular penetration testing and vulnerability finder tools, and is often used for checking web application security. “Burp,” as it is commonly known, is a proxy-based tool used to evaluate the security of web-based applications and do hands-on testing.


Dark Net

A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol.