Posts

SSL and TLS handshake

Image
 πŸ”’ What are SSL and TLS ? SSL (Secure Sockets Layer) is the original protocol from the 1990s that encrypts data between your browser and a website. It established the basics of web privacy but has known weaknesses and is no longer considered secure. TLS (Transport Layer Security) is the modern, improved replacement for SSL. It fixes earlier flaws, adds stronger algorithms, and is the standard behind HTTPS πŸ”. πŸ‘‰In short: people still say “SSL,” but what we actually use today is TLS. πŸ“œ Versions at a Glance Protocol Versions Status SSL SSL 1.0 (never released), 2.0 (1995), 3.0 (1996) πŸ”΄ Deprecated / insecure TLS TLS 1.0 (1999), 1.1 (2006), 1.2 (2008), 1.3 (2018) ✅ Use TLS 1.2 or 1.3 Best practice today: disable SSL, TLS 1.0, and TLS 1.1 on servers and clients. 🀝 The TLS/SSL Handshake — Step‑by‑client πŸ–Ό️ Diagram: TLS Handshake  High-level TLS/SSL handshake diagram showing ClientHello, ServerHello, certificate, key exchange, finished Alternative caption: the browser and server...

Cookie blog

Image
  πŸͺ Understanding Cookies: What They Are and Why They Matter When you hear the word cookies, you might think of chocolate chip snacks. But in the digital world, cookies are something else entirely. On the internet, cookies are tiny data files that websites store on your device to make your online experience smoother and more personalized. For example:When you log in to Gmail and it remembers your account next time, that’s because of cookies. When you add clothes to your Amazon cart and return later to find them still there, that’s cookies at work. ✅ What Are Cookies in Simple Terms? Cookies are small text files created by a website and stored in your browser. They help websites remember your: Login details – Example: Instagram remembers your username so you don’t log in every time. Preferences – Example: YouTube remembers your dark mode setting. Shopping Cart Items – Example: Flipkart keeps your products even after you close the app. πŸ” How Do Cookies Work? 1. You visit a website...

owasp-top10-blog

Image
  OWASP Top 10 Explained in Simple Terms (with Connected Real-Life Examples) Introduction Think of the internet like a huge city. There are shops (websites), security guards (developers), and, of course, thieves (hackers). The OWASP Top 10 is a list of the 10 most common mistakes that let thieves in. Let’s understand each one in simple language – and I’ll give you real-life examples that connect with the definition. 1. Broken Access Control What is it? When a system fails to stop people from accessing information or actions they shouldn’t. πŸ‘€ Real-life example: Imagine an office where anyone can walk into the CEO’s cabin because the security guard doesn’t check IDs. Similarly, on a website, if you can change a URL from /user/123 to /user/124 and see someone else’s profile, the system isn’t controlling access properly. ➡ Connection: The office example shows “access without permission,” and the URL trick is exactly how hackers exploit it. 2. Cryptographic Failures (Sensitive Data...