Everything about Security Misconfiguration

Photo by NASA on Unsplash

Introduction

Nowadays it is common as sometimes teams do not give proper concern to security best practices or the security has been misconfigured such as disclosing server version or the information. Sometimes…

--

--

--

Security enthusiast working to secure web for others.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Attack Surface Management. You’re (probably) doing it wrong.

{UPDATE} stoute jongen tandarts Hack Free Resources Generator

How to add BUSY Token to MetaMask

How Russian hackers are coming after you, personally

Kerberoasting detected in Microsoft Defender for Identity (v2.131)

Security Risks of using collaboration tools for your Business

Welcome, BuffaloSwap!

Business Email Compromise: the Often Ignored, Billion-Dollar Enterprise Threat

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gupta Bless

Gupta Bless

Security enthusiast working to secure web for others.

More from Medium

InSecure Design Vulnerabilities: What are they and Why they Occurs

Log4j 0-day vulnerability (RCE) — Explaination, Dectection, Exploitation.

My mindset while hunting on Yandex and my SSRF

First Time Hacking The Cloud