PortSwigger- Web Cache Poisoning With An Unkeyed Header
Hello Folks, This blog will focus on an advanced vulnerability called Web Cache Poisoning and dive deep into its concepts using PortSwigger’s platform. All big...
Hello Folks, This blog will focus on an advanced vulnerability called Web Cache Poisoning and dive deep into its concepts using PortSwigger’s platform. All big...
In this blog post series, we will discover APIs' vulnerabilities. Nowadays, APIs are used in all types of web applications and hence it is important...
All web applications use an Application Programming Interface (API) which is also vulnerable if exploited by an attacker. So as a penetration tester, we should...
This blog will focus on API Testing where we will learn about APIs and their vulnerabilities using PortSwigger platform. All website consists of the API and...
This lab focuses on the identification and exploitation of HTTP Host header vulnerability. We will understand this vulnerability and then see how we can perform...
Hello Folks, This blog focuses on HTTP Host Header vulnerability. We will cover the basics of the HTTP Host header and then we will see...
Hello folks, In this blog post, we will explore some other techniques to identify and exploit SQL Injection vulnerabilities. We will use PortSwigger’s platform to...
In this blog post, we'll explore the Blind SQL Injection vulnerability by inducing time delays and utilizing out-of-band requests to gain a deeper understanding. Here,...
In this blog, we will understand one of the most identifiable and difficult types of SQL Injection vulnerability. It is Blind SQL Injection. We will...
Hello folks, This blog will be based on Examining the Database using Union-based SQL Injection vulnerabilities. We will understand how we can get the database...
This blog delves into SQL Injection, a highly significant vulnerability. We'll explore various types of SQL Injection and learn how to detect and leverage them...
This blog delves into the advanced realm of Broken Access Control vulnerability, emphasizing Insecure Direct Object References and Multi-step processes lacking access control in a...