Browse Skills

Performing Soap Web Service Security Testing

v1.0.0

Perform security testing of SOAP web services by analyzing WSDL definitions and testing for XML injection, XXE, WS-Security bypass, and SOAPAction spoofing.

mukul975
3

Performing Soc 2 Type Ii Audit Preparation

v1.0.0

SOC 2 Type II audit preparation involves designing, implementing, and demonstrating the operational effectiveness of controls aligned to the AICPA Trust Services Criteria (TSC) over a defined audit pe

mukul975
3

Performing Ssl Stripping Attack

v1.0.0

>

mukul975
3

Performing Ssl Tls Inspection Configuration

v1.0.0

Configure SSL/TLS inspection on network security devices to decrypt, inspect, and re-encrypt HTTPS traffic for threat detection while managing certificates, exemptions, and privacy compliance.

mukul975
5

Performing Ssl Tls Security Assessment

v1.0.0

Assess SSL/TLS server configurations using the sslyze Python library to evaluate cipher suites, certificate chains, protocol versions, HSTS headers, and known vulnerabilities like Heartbleed and ROBOT.

mukul975
3

Performing Subdomain Enumeration With Subfinder

v1.0.0

Enumerate subdomains of target domains using ProjectDiscovery's Subfinder passive reconnaissance tool to map the attack surface during security assessments.

mukul975
3

Performing Supply Chain Attack Simulation

v1.0.0

Simulate and detect software supply chain attacks including typosquatting detection via Levenshtein distance, dependency confusion testing against private registries, package hash verification with pip, and known vulnerability scanning with pip-audit.

mukul975
5

Performing Threat Landscape Assessment For Sector

v1.0.0

Conduct a sector-specific threat landscape assessment by analyzing threat actor targeting patterns, common attack vectors, and industry-specific vulnerabilities to inform organizational risk management.

mukul975
2

Performing Vlan Hopping Attack

v1.0.0

>

mukul975
2

Performing Web Application Firewall Bypass

v1.0.0

Bypass Web Application Firewall protections using encoding techniques, HTTP method manipulation, parameter pollution, and payload obfuscation to deliver SQL injection, XSS, and other attack payloads past WAF detection rules.

mukul975
6

Performing Web Application Vulnerability Triage

v1.0.0

Triage web application vulnerability findings from DAST/SAST scanners using OWASP risk rating methodology to separate true positives from false positives and prioritize remediation.

mukul975
4

Performing Web Cache Deception Attack

v1.0.0

Execute web cache deception attacks by exploiting path normalization discrepancies between CDN caching layers and origin servers to cache and retrieve sensitive authenticated content.

mukul975
5