Arbaaz JamadarHow to start your self-paced cybersecurity career:Greetings to all fellow cybersecurity enthusiasts out there! I understand that embarking on a journey to learn cybersecurity independently…Sep 13, 2023Sep 13, 2023
Arbaaz JamadarJWTWhat is JWT: JWT is a JSON WEB TOKEN, JSON in JWT text-based format for transmitting data across web applications. It can be used as a…Feb 19, 2022Feb 19, 2022
Arbaaz JamadarSSRFServer-side request forgery (SSRF), lets an attacker send crafted requests from the back-end server of a vulnerable application. It is…Feb 15, 2022Feb 15, 2022
Arbaaz JamadarFile Inclusion 👀File inclusion vulnerability allows an attacker to access unauthorized files available on the web server or to execute malicious files on…Feb 9, 2022Feb 9, 2022
Arbaaz JamadarWhy is rate-limiting a necessity!1.In rate-limiting, there is a limit for requests we can make to a server/application it is implemented so that network would not be…Feb 4, 2022Feb 4, 2022
Arbaaz JamadarIDOR or IDOOR to unauthorized data!😉Insecure direct object reference (IDOR) occurs when an application provides direct access to objects based on user-supplied input. As a…Feb 4, 2022Feb 4, 2022
Arbaaz JamadarClickJackingggg!!Clickjacking is an interface-based attack in which a user is tricked into clicking on actionable content on a hidden website by clicking on…Jan 25, 2022Jan 25, 2022
Arbaaz JamadarCORSCross-origin resource sharing (CORS) is a browser mechanism which enables controlled access to resources located outside of a given domain.Jan 25, 2022Jan 25, 2022
Arbaaz JamadarWhat is information Disclosure Vulnerability!Revealing of sensitive information due to no proper security mechanisms or misconfigurations of an application is called Information…Jan 25, 2022Jan 25, 2022
Arbaaz JamadarWhy directory listing is necessarry!Directory Listing displays the directory contents when no index file is specified in a website directory. If there is no index file and the…Jan 25, 2022Jan 25, 2022