TheCS_StudentStealing Cookies With JavascriptWe will discover how to steal cookies via XSS. There are different ways to do so, but firstly and most importantly, the website has to be…4 min read·May 12, 2023----
TheCS_StudentExploiting Cross Site Request Forgery in Web Application Penetration TestsDiscover the techniques and methodologies for identifying and exploiting Cross Site Request Forgery (CSRF) vulnerabilities during…7 min read·Jan 19, 2023----
TheCS_StudentPenetration Testing essentials: Understanding and exploiting Remote Code ExecutionLearn the basics of Remote Code Execution (RCE) as a beginner pentester. Discover what RCE is, how to detect and exploit it, and best…7 min read·Jan 17, 2023----
TheCS_StudentSSRF: What every beginner pentester should knowLearn about Server-Side Request Forgery (SSRF) and how to protect your web applications. Our beginner-friendly guide covers the basics of…7 min read·Jan 15, 2023----
TheCS_StudentSubdomain Takeover: What It Is and How to Prevent ItWhat is Subdomain Takeover? (A friendly introduction)4 min read·Jan 13, 2023----
TheCS_StudentNoSQL Injection: Understanding, Exploiting and Mitigating The Threat To Your Web ApplicationsThis blog post discusses NoSQL injection, a type of web vulnerability where user-supplied data is passed to a NoSQL database without proper…5 min read·Jan 13, 2023----
TheCS_StudentUnderstanding JWT: A Beginner’s Guide to JSON Web TokensIf you ever wanted to get a secure session without exposing critical information or wanted to make it easier for you and your team to…6 min read·Jan 11, 2023----
TheCS_StudentThis is How I Managed To Change My Teams Availability Schedule With A Simple VulnerabilityBroken Access Control API vulnerability6 min read·Jan 8, 2023----