Application Security
SSRF - Server Side Request Forgery
May 04, 2020 Application Security

Server Side Request Forgery (SSRF) is a web security vulnerability that allows an attacker to induce the server side application to make HTTP requests to an arbitrary domain of the attacker's...

XSS in Modern Single Page Applications
Apr 29, 2020 Application Security

While React provides several built in protections against Cross Site Scripting (XSS) attacks, it's still possible to introduce XSS vulnerabilities in React applications. This comprehensive guide...

XSS - The Ultimate guide for Cross Site Scripting
Apr 28, 2020 Application Security

Cross Site Scripting (XSS) is one of the most prevalent and dangerous web application security vulnerabilities. According to OWASP, XSS consistently ranks among the top 10 web application security...

CSRF - Cross Site Request Forgery
Apr 27, 2020 Application Security

Cross Site Request Forgery (CSRF) is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It occurs when a malicious website,...

Server-Side Request Forgery
Apr 06, 2020 Application Security

SSRF (Server Side Request Forgery) is a type of security vulnerability where an attacker tricks a server into making a request to another internal or external system that the attacker shouldn’t have...

Common Web Application Technologies
Mar 30, 2020 Application Security

JWT JSON Web Tokens JWT is short for JSON Web Token. It is a compact and secure way to send information between two parties – like a client (browser) and a server. We usually use JWTs to: Log users...

Error based SQL Injection
Feb 15, 2020 Application Security

In the previous example, we saw how a classic SQL Injection Login Bypass works. SQL Injection is not all about that. The real fun is we can extract the data from the database. In this tutorial, we...

Out of Band SQL Injection
Feb 14, 2020 Application Security

Out of Band SQL Injection (OOB SQLi) is an advanced SQL injection technique where the attacker cannot retrieve data directly through the same communication channel used to send the injection payload....

Time based Blind SQL Injection
Feb 13, 2020 Application Security

Blind SQL Injection happens when: There is a SQL injection vulnerability, BUT the application does not show any SQL errors or query outputs directly. In this case, an attacker has to ask questions to...

Boolean based Blind SQL Injection
Feb 12, 2020 Application Security

Blind SQL Injection happens when: There is a SQL injection vulnerability, BUT the application does not show any SQL errors or query outputs directly. In this case, an attacker has to ask questions to...

 OWASP Top 10 explained - 2021
Feb 11, 2020 Application Security

The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation focused on improving the security of software. It provides free, vendor neutral tools, resources, and standards that...

SQL injection login bypass
Feb 10, 2020 Application Security

SQL Injection (SQLi) is one of the oldest and most fundamental web application vulnerabilities. While it’s becoming rarer in modern web apps due to better coding practices and frameworks,...

Common Web Application Attacks
Feb 05, 2020 Application Security

Web applications are one of the most targeted surfaces by attackers. This is primarily because they are accessible over the internet, making them exposed and potentially vulnerable. Since these...

Remote Command Execution
Jan 02, 2020 Application Security

Remote Command Execution (RCE) is a critical security vulnerability that allows an attacker to execute arbitrary commands on a remote server. This vulnerability can lead to unauthorized access, data...