Browsing Tag
kali linux
183 posts
How the Internet Works: A Hacker’s Primer
Before jumping into hunting for bugs, it’s essential to understand how the internet works. Finding web vulnerabilities is…
Sustaining Your Success: Mastering the Bug Bounty Journey
Even if you understand the technical information, you may still have difficulty navigating the nuances of bug bounty…
Cross-Site Request Forgery (CSRF) and Insecure Session Authentication
Cross-Site Request Forgery (CSRF) is a vulnerability where an attacker takes advantage of a logged-in user’s authenticated state…
Detecting and Preventing Injection Attacks: A Deep Dive into SQL, NoSQL, and Scanners
Code injection represents a critical class of security vulnerability where unvalidated data is added (injected) into a vulnerable…
A Quick Overview of Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) stands as a prevalent and dangerous vulnerability in web applications. It occurs when a malicious…
CSP Bypass: Turning a Security Header Against Itself
Introduction The Content Security Policy (CSP) is a special HTTP response header designed to mitigate certain classes of…
Client-Side Template Injection (CSTI): Exploiting Modern Frontend Frameworks
Introduction Front-end development has undergone rapid transformation over the past decade. Most modern web applications are built using…
Prototype Pollution: Poisoning the JavaScript Object Chain
Introduction JavaScript is fundamentally a prototype-based language. This means that objects do not inherit features from classes (like…
Server-Side Template Injection (SSTI): Exploiting the Backend View
Introduction To understand Server-Side Template Injection (SSTI), one must first grasp the role of templates, and to understand…
Web Cache Deception: Tricking the Caching Server to Expose Private Data
Introduction Like web cache poisoning, Web Cache Deception (WCD) is an attack directed against the caching server. The…