Monthly Archives: December 2020

What is Host Header Injection Attack ?

By | December 30, 2020

In this article, we are telling you about Host Header Injection Attack. You must have heard about HTTP Host Header attack or Host Header Injection Attack. Here we are telling you practically about Host Header Injection Attack, here we are telling you live on the website how Host Header Injection Attack works. Here we cannot… Read More »

How to do OS Command Injection Attack ?

By | December 25, 2020

In this article, we are telling you about OS Command Injection Attack, here we are telling you by solving some of its labs, you have been told about OS Command Injection Attack earlier. But there you were told about OS Command Injection Attack in BWAPP and DVWA but here we are telling you how we… Read More »

What is OAuth 2.0 authentication vulnerability ?

By | December 23, 2020

In this article, we are telling you about OAuth 2.0 authentication vulnerability. You can also call it Oauth 2.0 authorization. You may have heard its name for the first time. Because there is not much talk about OAuth 2.0 authentication vulnerability as well, you get a lot of work articles and videos about it on… Read More »

What is web cache poisoning Vulnerability ?

By | December 18, 2020

In this article we are telling you about web cache poisoning vulnerability What is web cache poisoning vulnerability and how to find this vulnerability in a website. Here web cache poisoning vulnerability is being told to you, both theory and practical, as you have been told before by labs solve, you are also being told… Read More »

What is Username Enumeration Vulnerability ?

By | December 16, 2020

In this article, we are telling you about Username Enumeration Vulnerability like what is Username Enumeration Vulnerability and when does it happen in a website. Here we are telling you about Username Enumeration Vulnerability practically as we have told you by solving labs earlier also, you are being told to solve its lab here too.… Read More »

What are DOM based vulnerabilities ?

By | December 11, 2020

In this article, we are telling you about DOM based vulnerabilities like what are DOM based vulnerabilities and how to find this vulnerability in website. We have already told you about cross site scripting attacks, there we have also told you about DOM based XSS attack, here DOM based vulnerabilities also works in some similar… Read More »

What is SERVER SIDE REQUEST FORGERY (SSRF) ?

By | December 9, 2020

In this article we are telling you about SERVER SIDE REQUEST FORGERY like what is SERVER SIDE REQUEST FORGERY and How to Find SSRF vulnerability Here you are being told about SERVER SIDE REQUEST FORGERY practically like we have told you before by solving labs like Insecure deserialization vulnerability and cross origin resource sharing If… Read More »

Cross Origin Resource Sharing Vulnerability ?

By | December 5, 2020

In this article we are telling you about cross origin resource sharing vulnerability like what is cross origin resource sharing vulnerability and how it is found in a website. Here we are also telling you by doing cross origin resource sharing vulnerability practical like we have told you earlier by solving labs of insecure deserialization… Read More »

What is Insecure Deserialization vulnerability ?

By | December 3, 2020

In this article, we are telling you about Insecure Deserialization vulnerability like what is Insecure Deserialization vulnerability, as well as how to find this bug in a website. You may have never heard of the name of Insecure Deserialization vulnerability, but if you find this bug in a website, you may get a good bug… Read More »

Bypass Website Two factor authentication ?

By | December 1, 2020

In this article, we are telling you about how to bypass website two factor authentication, you must also have heard about website two factor authentication at some time. How all this is done, how hackers bypass the limit of website two factor authentication in a website, it is being told by doing practical here, here… Read More »