Stealing Cookies With JavascriptWe will discover how to steal cookies via XSS. There are different ways to do so, but firstly and most importantly, the website has to be…May 12, 2023May 12, 2023
Exploiting Cross Site Request Forgery in Web Application Penetration TestsDiscover the techniques and methodologies for identifying and exploiting Cross Site Request Forgery (CSRF) vulnerabilities during…Jan 19, 2023Jan 19, 2023
Penetration Testing essentials: Understanding and exploiting Remote Code ExecutionLearn the basics of Remote Code Execution (RCE) as a beginner pentester. Discover what RCE is, how to detect and exploit it, and best…Jan 17, 2023Jan 17, 2023
SSRF: What every beginner pentester should knowLearn about Server-Side Request Forgery (SSRF) and how to protect your web applications. Our beginner-friendly guide covers the basics of…Jan 15, 2023Jan 15, 2023
Subdomain Takeover: What It Is and How to Prevent ItWhat is Subdomain Takeover? (A friendly introduction)Jan 13, 2023Jan 13, 2023
NoSQL Injection: Understanding, Exploiting and Mitigating The Threat To Your Web ApplicationsThis blog post discusses NoSQL injection, a type of web vulnerability where user-supplied data is passed to a NoSQL database without proper…Jan 13, 2023Jan 13, 2023
Understanding JWT: A Beginner’s Guide to JSON Web TokensIf you ever wanted to get a secure session without exposing critical information or wanted to make it easier for you and your team to…Jan 11, 2023Jan 11, 2023
This is How I Managed To Change My Teams Availability Schedule With A Simple VulnerabilityBroken Access Control API vulnerabilityJan 8, 2023Jan 8, 2023