{"id":1400,"date":"2025-01-07T18:13:02","date_gmt":"2025-01-07T12:43:02","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=1400"},"modified":"2025-10-22T14:50:33","modified_gmt":"2025-10-22T09:20:33","slug":"list-of-hacking-types-you-should-be-protecting-your-website-portal-against-part-1","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2025\/01\/list-of-hacking-types-you-should-be-protecting-your-website-portal-against-part-1\/","title":{"rendered":"List of hacking types you should be protecting your website \/ portal against &#8211; Part 1"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"ember20343\">Comprehensive List of Website Hacking Types (100+) sourced from ChatGPT<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>SQL Injection<\/li>\n\n\n\n<li>Blind SQL Injection<\/li>\n\n\n\n<li>Boolean-Based SQL Injection<\/li>\n\n\n\n<li>Time-Based SQL Injection<\/li>\n\n\n\n<li>Error-Based SQL Injection<\/li>\n\n\n\n<li>Cross-Site Scripting (XSS)<\/li>\n\n\n\n<li>Reflected XSS<\/li>\n\n\n\n<li>Stored XSS<\/li>\n\n\n\n<li>DOM-Based XSS<\/li>\n\n\n\n<li>Cross-Site Request Forgery (CSRF)<\/li>\n\n\n\n<li>Clickjacking<\/li>\n\n\n\n<li>Remote File Inclusion (RFI)<\/li>\n\n\n\n<li>Local File Inclusion (LFI)<\/li>\n\n\n\n<li>Directory Traversal<\/li>\n\n\n\n<li>Session Hijacking<\/li>\n\n\n\n<li>DNS Spoofing<\/li>\n\n\n\n<li>Man-in-the-Middle (MITM) Attack<\/li>\n\n\n\n<li>Brute Force Attack<\/li>\n\n\n\n<li>Credential Stuffing<\/li>\n\n\n\n<li>Dictionary Attack<\/li>\n\n\n\n<li>Code Injection<\/li>\n\n\n\n<li>Command Injection<\/li>\n\n\n\n<li>XML External Entities (XXE)<\/li>\n\n\n\n<li>HTTP Host Header Attack<\/li>\n\n\n\n<li>Broken Authentication<\/li>\n\n\n\n<li>Sensitive Data Exposure<\/li>\n\n\n\n<li>Security Misconfiguration<\/li>\n\n\n\n<li>Insecure Deserialization<\/li>\n\n\n\n<li>Server-Side Request Forgery (SSRF)<\/li>\n\n\n\n<li>Denial of Service (DoS)<\/li>\n\n\n\n<li>Distributed Denial of Service (DDoS)<\/li>\n\n\n\n<li>Path Manipulation<\/li>\n\n\n\n<li>Subdomain Takeover<\/li>\n\n\n\n<li>Open Redirect<\/li>\n\n\n\n<li>Cache Poisoning<\/li>\n\n\n\n<li>Business Logic Attack<\/li>\n\n\n\n<li>Social Engineering<\/li>\n\n\n\n<li>Zero-Day Exploit<\/li>\n\n\n\n<li>Exploit Kits<\/li>\n\n\n\n<li>Malware Injection<\/li>\n\n\n\n<li>Web Shell Attack<\/li>\n\n\n\n<li>Phishing<\/li>\n\n\n\n<li>Spear Phishing<\/li>\n\n\n\n<li>Whaling<\/li>\n\n\n\n<li>Content Spoofing<\/li>\n\n\n\n<li>Parameter Tampering<\/li>\n\n\n\n<li>URL Manipulation<\/li>\n\n\n\n<li>Cookie Poisoning<\/li>\n\n\n\n<li>HTTP Response Splitting<\/li>\n\n\n\n<li>Broken Access Control<\/li>\n\n\n\n<li>API Abuse<\/li>\n\n\n\n<li>Side-Channel Attack<\/li>\n\n\n\n<li>Supply Chain Attack<\/li>\n\n\n\n<li>CSP Bypass (Content Security Policy Bypass)<\/li>\n\n\n\n<li>OAuth Misconfiguration<\/li>\n\n\n\n<li>DOM-Based XSS<\/li>\n\n\n\n<li>Web Cache Deception<\/li>\n\n\n\n<li>CRLF Injection<\/li>\n\n\n\n<li>Eavesdropping<\/li>\n\n\n\n<li>Remote Code Execution (RCE)<\/li>\n\n\n\n<li>Privilege Escalation<\/li>\n\n\n\n<li>SQL Truncation Attack<\/li>\n\n\n\n<li>Timing Attack<\/li>\n\n\n\n<li>Padding Oracle Attack<\/li>\n\n\n\n<li>Credential Harvesting<\/li>\n\n\n\n<li>Session Fixation<\/li>\n\n\n\n<li>URL Redirection Attack<\/li>\n\n\n\n<li>HTTP Parameter Pollution (HPP)<\/li>\n\n\n\n<li>Race Condition<\/li>\n\n\n\n<li>Slowloris Attack<\/li>\n\n\n\n<li>DNS Amplification Attack<\/li>\n\n\n\n<li>Smurf Attack<\/li>\n\n\n\n<li>Ping of Death<\/li>\n\n\n\n<li>SYN Flood<\/li>\n\n\n\n<li>TCP Hijacking<\/li>\n\n\n\n<li>ICMP Flood<\/li>\n\n\n\n<li>ARP Spoofing<\/li>\n\n\n\n<li>Email Spoofing<\/li>\n\n\n\n<li>Typosquatting<\/li>\n\n\n\n<li>Watering Hole Attack<\/li>\n\n\n\n<li>Malvertising<\/li>\n\n\n\n<li>Click Fraud<\/li>\n\n\n\n<li>Cookie Injection<\/li>\n\n\n\n<li>Cookie Theft<\/li>\n\n\n\n<li>Cookie Tampering<\/li>\n\n\n\n<li>DNS Cache Poisoning<\/li>\n\n\n\n<li>Command and Control (C2) Attack<\/li>\n\n\n\n<li>Keylogging<\/li>\n\n\n\n<li>Credential Reuse Attack<\/li>\n\n\n\n<li>Watermarking Attack<\/li>\n\n\n\n<li>Image-Based Attack (Steganography)<\/li>\n\n\n\n<li>WebRTC Leak<\/li>\n\n\n\n<li>Host Header Injection<\/li>\n\n\n\n<li>Token Hijacking<\/li>\n\n\n\n<li>Hidden Field Manipulation<\/li>\n\n\n\n<li>Bypassing Input Validation<\/li>\n\n\n\n<li>Null Byte Injection<\/li>\n\n\n\n<li>File Upload Vulnerability<\/li>\n\n\n\n<li>Cross-Origin Resource Sharing (CORS) Exploit<\/li>\n\n\n\n<li>Cross-Origin Request Attack (COR)<\/li>\n\n\n\n<li>Security Token Exposure<\/li>\n\n\n\n<li>HTML Injection<\/li>\n\n\n\n<li>Frame Injection<\/li>\n\n\n\n<li>Tabnabbing<\/li>\n\n\n\n<li>DNS Rebinding<\/li>\n\n\n\n<li>HTTP Smuggling<\/li>\n\n\n\n<li>HTTP Desync Attack<\/li>\n\n\n\n<li>SSL Stripping<\/li>\n\n\n\n<li>TLS Downgrade Attack<\/li>\n\n\n\n<li>JavaScript Injection<\/li>\n\n\n\n<li>Python Code Injection<\/li>\n\n\n\n<li>Bash Injection<\/li>\n\n\n\n<li>Shellshock Attack<\/li>\n\n\n\n<li>Path Traversal<\/li>\n\n\n\n<li>Symlink Attack<\/li>\n\n\n\n<li>Broken Function Level Authorization<\/li>\n\n\n\n<li>DNS Tunneling<\/li>\n\n\n\n<li>WebSocket Injection<\/li>\n\n\n\n<li>Parameter Pollution<\/li>\n\n\n\n<li>Java Deserialization Attack<\/li>\n\n\n\n<li>PHP Object Injection<\/li>\n\n\n\n<li>Command Injection via Environment Variables<\/li>\n\n\n\n<li>Header Injection<\/li>\n\n\n\n<li>RegEx Injection<\/li>\n\n\n\n<li>Server-Side Template Injection (SSTI)<\/li>\n\n\n\n<li>PHP Code Injection<\/li>\n\n\n\n<li>DOM Clobbering<\/li>\n\n\n\n<li>Prototype Pollution<\/li>\n\n\n\n<li>Buffer Overflow<\/li>\n\n\n\n<li>Heap Overflow<\/li>\n\n\n\n<li>Stack Overflow<\/li>\n\n\n\n<li>Heap Spray Attack<\/li>\n\n\n\n<li>Session Replay Attack<\/li>\n\n\n\n<li>Token Replay Attack<\/li>\n\n\n\n<li>Referrer Leakage<\/li>\n\n\n\n<li>Weak Password Attack<\/li>\n\n\n\n<li>Content Injection<\/li>\n\n\n\n<li>Response Tampering<\/li>\n\n\n\n<li>Email Injection<\/li>\n\n\n\n<li>Path Manipulation Attack<\/li>\n\n\n\n<li>JSON Injection<\/li>\n\n\n\n<li>LDAP Injection<\/li>\n\n\n\n<li>XPath Injection<\/li>\n\n\n\n<li>iFrame Injection<\/li>\n\n\n\n<li>Process Injection<\/li>\n\n\n\n<li>Memory Corruption<\/li>\n\n\n\n<li>Cross-Site History Manipulation<\/li>\n\n\n\n<li>Drive-by Download Attack<\/li>\n\n\n\n<li>Command Injection via Shell<\/li>\n\n\n\n<li>Exposed Debug Endpoint<\/li>\n\n\n\n<li>Rate Limiting Bypass<\/li>\n\n\n\n<li>Anti-Automation Bypass<\/li>\n\n\n\n<li>Automated Scanner Detection Bypass<\/li>\n\n\n\n<li>WAF Bypass (Web Application Firewall)<\/li>\n\n\n\n<li>Websocket Abuse<\/li>\n\n\n\n<li>Multi-Factor Authentication (MFA) Bypass<\/li>\n\n\n\n<li>Sensitive File Exposure<\/li>\n\n\n\n<li>Default Credentials Exploit<\/li>\n\n\n\n<li>Hidden Admin Panel Detection<\/li>\n\n\n\n<li>Deprecated API Exploit<\/li>\n\n\n\n<li>Weak CAPTCHA Protection<\/li>\n\n\n\n<li>Insufficient Logging and Monitoring<\/li>\n\n\n\n<li>Excessive Data Exposure<\/li>\n\n\n\n<li>Improper Error Handling<\/li>\n\n\n\n<li>Full Path Disclosure<\/li>\n\n\n\n<li>WebRTC Exploit<\/li>\n\n\n\n<li>Content Spoofing in HTML Emails<\/li>\n\n\n\n<li>Vulnerable JavaScript Libraries<\/li>\n\n\n\n<li>Browser Fingerprinting<\/li>\n\n\n\n<li>Remote Desktop Exploit<\/li>\n\n\n\n<li>SAML Injection<\/li>\n\n\n\n<li>JWT Token Forgery<\/li>\n\n\n\n<li>Firebase Misconfiguration<\/li>\n\n\n\n<li>Server Misconfiguration<\/li>\n\n\n\n<li>Third-Party Script Exploits<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email me: <a href=\"mailto:Neil@HarwaniSytems.in\">Neil@HarwaniSytems.in<\/a><\/li>\n\n\n\n<li>Website: <a href=\"http:\/\/www.harwanisystems.in\/\">www.HarwaniSystems.in<\/a><\/li>\n\n\n\n<li>Blog: <a href=\"http:\/\/www.techandtrain.com\/blog\">www.TechAndTrain.com\/blog<\/a><\/li>\n\n\n\n<li>LinkedIn: <a href=\"https:\/\/www.linkedin.com\/in\/neil27\/\">Neil Harwani | LinkedIn<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Comprehensive List of Website Hacking Types (100+) sourced from ChatGPT<\/p>\n","protected":false},"author":2,"featured_media":1401,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[40],"tags":[61,429],"class_list":["post-1400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cyber-security","tag-web-security"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Website.jpg?fit=1280%2C853&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-mA","jetpack-related-posts":[{"id":950,"url":"https:\/\/www.techandtrain.com\/blog\/2022\/08\/cyber-security-keywords-concepts-part-1\/","url_meta":{"origin":1400,"position":0},"title":"Cyber Security Keywords &#038; Concepts &#8211; Part 1","author":"Neil Harwani","date":"August 28, 2022","format":false,"excerpt":"Here is a list of keywords & concepts in Cyber Security that technology professionals should be aware of. This is part 1 of the series. CSPXSSISO 27001OWASPEncoding \/ decodingEncryption and it's typesCSRFCORSHashingAuthenticationAuthorizationIAMSSOSAMLOAuthTokensHTTPS \/ SSLDOS \/ DDOSBackdoorMalwareSecure codingThreats, Vulnerabilities, Controls & MitigationVAPTSocial EngineeringSpoofingProxy serversPhishingSQL injectionBuffer overflowViruses, Worms, Keyloggers, SpywaresIdentity theftRootKitsZero DayVPN\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2022\/08\/CyberSecurity.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1242,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/04\/cyber-security-tips-for-portals-generated-by-chatgpt-gemini-part-1\/","url_meta":{"origin":1400,"position":1},"title":"Cyber security tips for Portals &#8211; Generated by ChatGPT &amp; GEMINI &#8211; Part 1","author":"Neil Harwani","date":"April 8, 2024","format":false,"excerpt":"Cyber security is a critical concern for portal applications, which often serve as gateways to a wide range of resources and services. Here are some vital tips to enhance the cyber security posture of portal applications: 1. Use Strong Authentication Mechanisms: Implement multi-factor authentication (MFA) to add an extra layer\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1380,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/web-portal-commerce-cyber-forensics\/","url_meta":{"origin":1400,"position":2},"title":"Web portal &amp; commerce cyber forensics","author":"Neil Harwani","date":"November 24, 2024","format":false,"excerpt":"For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like SharePoint which has good documentation. Home - Liferay WordPress.com: Build a Site, Sell Your Stuff, Start a Blog & More Drupal - Open Source CMS | Drupal.org Microsoft SharePoint Online\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1452,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/06\/common-technical-challenges-in-software-engineering-grouped-by-category-part-1-collated-from-ai\/","url_meta":{"origin":1400,"position":3},"title":"Common technical challenges in software engineering, grouped by category &#8211; Part 1 (Collated from AI)","author":"Neil Harwani","date":"June 1, 2025","format":false,"excerpt":"Here are common technical challenges in software engineering, grouped by category, that developers and architects frequently face: 1. Scalability Horizontal vs vertical scaling Handling increased load (users, data, transactions) Designing for elasticity in cloud-native environments Bottlenecks in monoliths or microservices 2. Performance Optimization Slow I\/O or database queries Memory leaks\u2026","rel":"","context":"In &quot;Architecture&quot;","block_context":{"text":"Architecture","link":"https:\/\/www.techandtrain.com\/blog\/category\/architecture\/"},"img":{"alt_text":"Image credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/06\/Architecture.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/06\/Architecture.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/06\/Architecture.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/06\/Architecture.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/06\/Architecture.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1432,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/03\/cybersecurity-and-cyber-forensic-tools-part-1-collated-from-internet-ai\/","url_meta":{"origin":1400,"position":4},"title":"Cybersecurity and Cyber Forensics tools &#8211; Part 1 (Collated from internet &amp; AI)","author":"Neil Harwani","date":"March 7, 2025","format":false,"excerpt":"Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark \u2013 Network packet analyzer Snort \u2013 Open-source network intrusion detection system (NIDS) Suricata \u2013 High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) \u2013 Network\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Image Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1199,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/01\/differences-between-sast-and-dast-bard-generated\/","url_meta":{"origin":1400,"position":5},"title":"Differences between SAST and DAST &#8211; BARD Generated","author":"Neil Harwani","date":"January 14, 2024","format":false,"excerpt":"SAST and DAST: Two Key Players in Application Security When it comes to protecting your software from malicious actors, you need a solid security strategy. Two crucial techniques in this arsenal are Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Let's break down what each does and\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/01\/SDAST.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=1400"}],"version-history":[{"count":1,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1400\/revisions"}],"predecessor-version":[{"id":1402,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1400\/revisions\/1402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/1401"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=1400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=1400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=1400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}