ShatabdaLife Lessons: The Art of LearningWhile I was on my reading spree, a line struck me, "You can learn anything from anyone". Immediately, I found myself teleported to a world…Jun 20, 2018Jun 20, 2018
ShatabdaSecurity: Log Injection. What? How?Log Injection (or Log Forgery) is a vulnerability that arises when un-trusted and un-validated input is allowed…May 27, 2018May 27, 2018
ShatabdaSecurity: XPath Injection. What? How?It is a type of attack where a malicious input can lead to un-authorised access or exposure of sensitive information…May 27, 2018May 27, 2018
ShatabdaCybersecurity and its Challenges.In today's digital era, Cyber security is a necessity rather than a burden for a company in its endeavour to success..May 19, 2018May 19, 2018
ShatabdaSecurity: SSI Injection. What? How?Before getting started, lets assume we have a web application that contains multiple pages and each page requires a change in the…May 13, 20181May 13, 20181
ShatabdaSecurity: CSV or Formula Injection. What? How?Web applications provide export/import of data as a functionality for their users. The data is usually in the form of XLS/CSV. This allows…May 6, 20181May 6, 20181
ShatabdaSecurity: Tabnabbing. What? How?As internet continues to reach every household and business, its usage has grown enormously with millions accessing it at the same time…May 6, 20181May 6, 20181