Dhiren Kumar PradhanSQL Injection Due To Weak Filtering in PHPWeak filtering occurs when an application uses insufficient or improper techniques to validate or sanitize user-supplied data before it is…Oct 5Oct 5
Dhiren Kumar PradhanHow I Discovered an Account Takeover from a Reset Password VulnerabilityVulnerabilities related to password management are both common and impactful. They offer a window of opportunity for attackers to hijack…Sep 22Sep 22
Dhiren Kumar Pradhan2nd Order SQL InjectionSQL Injection (SQLi) has long been a well-known attack vector that targets the backend database of web applications. While most developers…Sep 9Sep 9
Dhiren Kumar PradhanThe correct way to perform port scanning with NmapInstalling Nmap: The Right WayAug 30Aug 30
Dhiren Kumar PradhanHow to Find DOM XSS During Code Review of JavaDOM-based Cross-Site Scripting (XSS) is a type of security vulnerability that occurs when untrusted data is manipulated and executed as…Aug 29Aug 29
Dhiren Kumar PradhanExploiting Second-Order IDOR VulnerabilitiesSecond-order IDOR (Insecure Direct Object Reference) vulnerabilities are a subtle and complex variant of the traditional IDOR…Aug 281Aug 281
Dhiren Kumar PradhanExploiting IDORs in APIs That Use Static KeywordsInsecure Direct Object References (IDOR) vulnerabilities are a common and critical security flaw often found in APIs. These vulnerabilities…Aug 28Aug 28
Dhiren Kumar PradhanExploiting IDORs via JSON GlobbingIn web security, Insecure Direct Object References (IDORs) are a common vulnerability that allows unauthorized users to access or…Aug 27Aug 27