Insecure Direct Object Reference – a modern age SQLi
In the previous posts, we already covered the most critical vulnerabilities like XSS and SQL Injection as well as some moderate ones like CSRF. In this post, we will see ...
Read More
How to become a hacker in 10 mins?
Hey, welcome again everyone to this new blog post. This one is quite different from the other posts because in this post we will tell you how to become a ...
Read More
Everything you need to know to find CSRF vulnerabilities
Welcome, everyone. In this post, we will look at another critical web application vulnerability. CSRF or Cross-Site Request forgery basically means that the application isn’t able to distinguish between the ...
Read More
SQL injection exploitation with and without SQLmap
Hey everyone. Welcome in this brand new tutorial in which we are going to look at “SQL Injection”, one of the most dangerous web application vulnerability considered by the OWASP ...
Read More
3 must have tools for Penetration testers
Welcome folks. In the previous posts, we have been talking about web application penetration testing in depth. But in this post, we will look at the 3 most useful tools ...
Read More
How to approach for XSS hunting in a web application.
Hi, every security enthusiast out there. In this blog, we are going to tell you how to approach to find Cross-Site Scripting vulnerabilities in a web application. So what is ...
Read More
Pentesting a wordpress website using WPSCAN
Ever thought of quickly testing a WordPress website for known vulnerabilities and expired plugins or themes? Well, here is a blog on one of such fantastic tool $wpscan What is ...
Read More
5 nmap scans to help you in Penetration testing
Hi, everyone. In this post, we are going to discuss the 5 Nmap scans every penetration tester should add in their arsenal. So what is Nmap and why is it ...
Read More
Exploiting & Securing Mobile Apps: A Penetration Testing Training
The course includes extremely unique, real world vulnerabilities. The attendees will be understanding the concept behind each vulnerability, and then exploiting the vulnerability on the target application. The flow of ...
Read More