Md Shahid AlamOWASP Top 5 Vulnerability Explanation with implementation | Learn Ethical Hacking | Learn Bug…DOS(Denial Of Service) Attakc via Long Password: A denial-of-service (DoS) attack via a long password is a type of application-layer attack…Oct 8, 2023Oct 8, 2023
Md Shahid Alam10 Common and known Vulnerabilities | Learn Ethical HackingBrute Force Attack : A brute-force attack is a cyberattack in which an attacker tries to guess a password or other secret code by trying…Oct 8, 2023Oct 8, 2023
Md Shahid AlamCommon Vulnerabilities in Web applications.Subdomain Takeover: Attacker gains control of a subdomain of a legitimate website. This can happen when a subdomain is no longer in use…Oct 8, 2023Oct 8, 2023