Security Audit

Our Web Application Pentest ( WAP) attempts to address the Owasp top 10 & SANS top 20 web application vulnerabilities and other exploitable loopholes of your web application . Along with it our WAP team also test web applications for Business logic flaws that can directly or indirectly effect the functioning of application.


We are here to help you solve your biggest query- where and how to start? CDI has brought various courses in Ethical Hacking in Chandigarh where all you technology lovers will be given the much needed push to move forward and create a niche for yourself in the field. From Beginner to Expert level we have many kinds of training patterns.

Call Us : +91-771045-0011 | +91-771045-0022

Every upcoming major tech company face a host of challenges in running operations. Their systems are regularly targeted by hackers and the attack that is used as a weapon by them mostly is, "DDoS or generally known as Distributed Denial of Service" attacks. This is the most basic attack used by hackers but it's consequences are severe if the attackers are able to penetrate the security firewalls. The attacks are carried out by in order to make network resources unavailable to it's user.

The modus operandi of the hackers is to target the servers in a group with external communication requests at such a fast speed that the serves crashes down & fail to respond to genuine traffic.

"The first demonstrated DDoS attack was introduced by well known hacker Khan C. Smith during a 1998 illegal Defcon event and later exposed for its use Botnet mechanisms during a lawsuit filed by Earthlink which claims has caused billions in economic damages."

DDoS attacks are always a tough challenge for the security division of the tech company. One of the aspect that helps in the countering the attacks are it's security firewall fundamentals, which needs to be strong enough to withstand the onslaught. Famous website, GitHub was attacks using DDoS attack.

"We've been under continuous DDoS attack for 24+ hours. The attack is evolving, and we're all hands on deck mitigating. " stated the official response.

Early investigation seems to indicate about the involvement of hijacking of scripts as soon they crossed the chinese border. A certain device at the border of China's inner network and the Internet has hijacked the HTTP connections went into China, replaced some javascript files from Baidu with malicious ones," wrote a researcher at Insight Labs.

Leave a Reply

Email id
Contact No

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.