Browse Skills

Performing Web Cache Poisoning Attack

v1.0.0

Exploiting web cache mechanisms to serve malicious content to other users by poisoning cached responses through unkeyed headers and parameters during authorized security tests.

mukul975
2

Performing Wireless Network Penetration Test

v1.0.0

Execute a wireless network penetration test to assess WiFi security by capturing handshakes, cracking WPA2/WPA3 keys, detecting rogue access points, and testing wireless segmentation using Aircrack-ng and related tools.

mukul975
3

Performing Wireless Security Assessment With Kismet

v1.0.0

Conduct wireless network security assessments using Kismet to detect rogue access points, hidden SSIDs, weak encryption, and unauthorized clients through passive RF monitoring.

mukul975
3

Prioritizing Vulnerabilities With Cvss Scoring

v1.0.0

The Common Vulnerability Scoring System (CVSS) is the industry standard framework maintained by FIRST (Forum of Incident Response and Security Teams) for assessing vulnerability severity. CVSS v4.0 (r

mukul975
5

Recovering From Ransomware Attack

v1.0.0

>

mukul975
2

Implementing Api Gateway Security Controls

v1.0.0

>

mukul975
4

Implementing Api Key Security Controls

v1.0.0

>

mukul975
4

Implementing Api Schema Validation Security

v1.0.0

Implement API schema validation using OpenAPI specifications and JSON Schema to enforce input/output contracts and prevent injection, data exposure, and mass assignment attacks.

mukul975
2

Implementing Api Security Posture Management

v1.0.0

Implement API Security Posture Management to continuously discover, classify, and score APIs based on risk while enforcing security policies across the API lifecycle.

mukul975
4

Implementing Api Security Testing With 42crunch

v1.0.0

Implement comprehensive API security testing using the 42Crunch platform to perform static audit and dynamic conformance scanning of OpenAPI specifications.

mukul975
6

Implementing Api Threat Protection With Apigee

v1.0.0

Implement API threat protection using Google Apigee policies including JSON/XML threat protection, OAuth 2.0, SpikeArrest, and Advanced API Security for OWASP Top 10 defense.

mukul975
4

Implementing Aqua Security For Container Scanning

v1.0.0

Deploy Aqua Security's Trivy scanner to detect vulnerabilities, misconfigurations, secrets, and license issues in container images across CI/CD pipelines and registries.

mukul975
3