Your Perfect Cybersecurity Partner

Stay Connected:

Image
3.2 K
views
29th May 2019 3186

Server Side Includes Injection

Server Side Includes (SSIs) are directives present on web applications, used to feed an HTML page of the application with dynamic contents based on user’s input.

Image
1.6 K
views
30th September 2019 1566

Growing Data Breaches And The Best Ways To Be Safe From Them

Data breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.

Image
1.6 K
views
29th April 2020 1612

Evolution of Ransomware and the trends in 2020

Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

Image
1.1 K
views
23rd August 2022 1132

Why should we use a proxy server?

People don't often stop to think about the most basic parts of how the internet works. But what happens when you browse the Internet? You could be using a proxy server at work, on a Virtual Private Network (VPN).

Image
3.1 K
views
30th May 2019 3102

Detection and Exploitation of XML External Entity Attack XXE

XML External Entity Attack happens when an application allows an input parameter to be XML or incorporated into XMLwhich is passed to an XML parser

Image
4 K
views
6th October 2018 3984

Cross Site Port Attack XSPA

A web application is helpless against Cross Site Port Attack if it forms client provided URL’s and does not disinfect the backend reaction obtained from remote servers previously while sending it back to the client.

7th October 2022 783

What weak credentials can do?

Yes! Hacking people's accounts is illegal. Hacker’s are enjoyed playing with weak credentials. A weak password is one that is easy to guess using a subset of all possible passwords in a brute force attack.

5th August 2022 981

What are the benefits of Cloud Penetration testing?

It all depends on how you perceive it to be. Most business owners feel that cloud space equals cloud security. Now, before I reveal the answer let’s see the story below; Accenture is no doubt the biggest name in software.

Image
1.7 K
views
6th November 2019 1730

Important Vulnerabilities And Smart Ways To Be Secured From Them

There’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .

Image
1.1 K
views
11th October 2022 1068

What is the difference between OWASP Top 10 and ASVS Security Audit

OWASP is the blueprint for testing the web application security controls. It is safe to say that it helps the developers to develop application.

Image
1.1 K
views
8th September 2022 1083

What Are Security Headers and How Can We Implement Them For our Website?

When a browser asks a web server for a page, the server sends back the page's content along with headers. Some headers have meta-data about the content,

Image
5.2 K
views
4th May 2019 5229

Null Byte SQL Injection

Null Byte Injection is an exploitation technique which uses URL-encoded null byte characters to the user-supplied data. This injection process can alter the intended logic .

Image
5.5 K
views
28th May 2019 5531

CRLF Injection Attack

The term CRLF refers to Carriage Return (ASCII 13, , \r) Line Feed (ASCII 10, , \n). Carriage Return means the end of a line, and Line Feed refers to the new line. In more simple words, both of these are used to note the end of a line.

Image
23.7 K
views
3rd October 2018 23709

Host Header Attack

Most commonly many web servers are configured in such a way, to hosts several websites or web applications on the same IP address. That’s why the Host Header Injection occurs.

Image
1.2 K
views
10th August 2022 1214

What is the difference between Manual Penetration Testing versus Automated Penetration Testing?

The new normal has made the market bigger for digital transformation projects and strategies for moving to the cloud.

Image
1.4 K
views
29th July 2022 1440

XML Rpc Attack

Yes, I am talking about U.S department of defense get hacked. Bibek Dhakal found that the xmlrpc.php file on the U.S. Department of Defense website had been turned on leaving it open to an attack on other sites. The XML Rpc.php in WordPress is turned on by default

Image
1.4 K
views
2nd August 2022 1372

Word-press plugin lightspeed caches security flaws and how to exploit them

WordPress plugin LiteSpeed Cache has a cross-site scripting vulnerability because it does not properly sanitize user input. An attacker can take advantage.

13th October 2022 698

What is Black box Security Testing?

In this kind of testing, the penetration tester acts like a normal hacker who doesn't know anything about the target system.Testers don't get any diagrams of the architecture or source code that isn't available to the public.

Image
1 K
views
12th May 2022 1043

Json web token and its exploitation

As an open standard, the JSON Web Token (JWT) defines a compact and self-contained method for securely transmitting information between parties as a JSON object (RFC 7519).

Image
2.9 K
views
4th May 2019 2871

How to secure your Github repository?

GitHub is a hosting platform which helps developers to collaborate in building software’s. It helps the developers to manage source code management.

Image
2 K
views
3rd October 2018 1971

CWE-78 Improper Neutralization Of Special Elements Used In An OS Command Injection

OS command injection is a technique used via a web interface in order to execute OS commands on a web server. The user supplies operating system commands through a web interface in order to execute OS commands.