Web Application Security

SECOND ORDER SQL INJECTION ATTACK

Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know…

3 years ago

Server-Side Template Injection Vulnerability & Exploitation

In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting…

3 years ago

Brand Reputation

Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by the customers, clients,…

3 years ago

Open Redirect

What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes…

3 years ago

CRLF Injection

Before going into details on what and how to find and perform CRLF injection and what are the measure one…

3 years ago

HTTP Parameter Pollution

The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to…

3 years ago

Communication Protocol – WebSocket Overview

What is a WebSocket? WebSocket is a Client-Server Bidirectional Communication protocol initiated over HTTP. WebSockets are used where there is…

3 years ago

HTTP Request Smuggling

What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one…

3 years ago

Formjacking – The New Favourite Cyber Crooks Hack

“We are in the most popular world of – Black hat hacker”  What is Formjacking Attack? The year's rampant threat…

5 years ago

Web Services Security Testing

At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…

5 years ago