Second Order SQL Injection Attack: Second Order SQL Injection Attack are those which are not widely discussed. Important to know…
In this blog, we are going to discuss on Server-Side Template Injection (SSTI) vulnerability and its exploitation. Before directly getting…
Brand Reputation: Brand reputation is the study of how a particular brand is viewed and perceived by the customers, clients,…
What is Open Redirect? An open redirect is a security flaw in an application or a web page that causes…
Before going into details on what and how to find and perform CRLF injection and what are the measure one…
The parameter enables pages to load data from the back-end e.g., ID, search query. They make websites more interactive to…
What is a WebSocket? WebSocket is a Client-Server Bidirectional Communication protocol initiated over HTTP. WebSockets are used where there is…
What is HTTP Request Smuggling? HTTP Request Smuggling is a vulnerability that takes advantage of the misconfiguration in parsing one…
“We are in the most popular world of – Black hat hacker” What is Formjacking Attack? The year's rampant threat…
At present, the web services have turned into an integral portion of the both mobile and web applications. Because the…