Open Redirect

5 years ago

What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes…

CRLF Injection

5 years ago

Before going into details on what and how to find and perform CRLF injection and what are the measure one…

AWS Pentesting – Part – 1

5 years ago

Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more…

MALWARE ANALYSIS – PART 2 (SETTING UP THE LAB)

5 years ago

In the previous blog, we have got a basic idea about Malware like what is malware, its behavior, types, and…

HTTP Parameter Pollution

5 years ago

The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to…

Communication Protocol – WebSocket Overview

5 years ago

What is a WebSocket? WebSocket is a Client-Server Bidirectional Communication protocol initiated over HTTP. WebSockets are used where there is…

Introduction to Information Security Management System (ISMS)

5 years ago

What is an Information Security Management System ? An Information Security Management System (ISMS) is a set of policies and…

HTTP Request Smuggling

5 years ago

What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one…

Risk Management

5 years ago

Every organization conducts risk assessment and mitigation in order to identify risks and minimize their impact via risk mitigation. However,…

Misconfigured Cross-Origin Resource Sharing (CORS) Risk

5 years ago

The Cross-Origin Resource Sharing (CORS) is a mechanism to relax the Same Origin Policy (SOP) and to enable communication between…