Skip to content

AppSec, Network Security, Penetration Testing, Bug Bounties, Coding and more..

Menu
  • Home
  • OWASP TOP 10
    • OWASP TOP 10
    • OWASP API TOP 10
    • OWASP MOBILE TOP 10
    • SANS TOP 25
  • PENTESTING
    • WEB SECURITY
    • Web App Pentest
    • API Pentest
    • Android Pentesting
    • 0day
    • Windows Pentesting
    • Linux Pentesting
    • Active Directory Pentest
    • Linux Priv-Escalation
    • Windows Priv-Escalation
  • Coding
    • GoLang
    • Python
    • PowerShell
    • Bash Scripting
    • Batch Scripting
    • Java
  • Network Study
    • Networking Basics
    • TCP-IP/OSI Model
    • Essential Protocols
  • CTF
    • Vuln-Hub
  • Certification
    • CEH
    • OSCP
  • My Tools
  • Portfolio

Category: OWASP TOP 10

The OWASP TOP 10 Vulnerability with detailed Explanation

Posted onDecember 14, 2021December 14, 2021OWASP TOP 10, PENTESTING, WEB SECURITY

CORS Misconfiguration Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

by AdminLeave a comment on CORS Misconfiguration Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

Introduction CORS or Cross-origin Resource Sharing allows web developers to work around the same-origin policy. The CORS standard describes new HTTP headers which provide browsers…

Read More
Posted onDecember 12, 2021December 12, 2021OWASP TOP 10, PENTESTING, WEB SECURITY

IDOR Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

by AdminLeave a comment on IDOR Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

Introduction A Direct Object Reference is a web application design method in which entity names are used to identify application-controlled resources that are passed in…

Read More
Posted onDecember 11, 2021December 11, 2021OWASP TOP 10, PENTESTING, WEB SECURITY

CSRF Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

by AdminLeave a comment on CSRF Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

Introduction The CSRF or Cross Site Request Forgery is a web vulnerability, where an attacker tricks the victim’s browser to send forged requests to a…

Read More

Posts navigation

Previous Page Page 1 Page 2

About Me

Hi, My name is Ajay Kumar Tekam, I am a Cyber Security Enthusiast and currently looking for opportunity to work in cyber security positions. The area of my interests are Web Pentesting, Mobile Application Pentesting and Network Pentesting. Currently i do bog hunting at bugcrowd.com as a freelancer. In my free time i write security automation tools in python, GoLang and Bash. You can find my portfolio, CV and more about me at ajaytekam.github.io

Recent Posts

  • How DNS Works : Guide To DNS Security
  • ANDROID PENTESTING SERIES PART 2 : Overview of Android Components
  • ANDROID PENTESTING SERIES PART 3 : Overview of Android Security
  • ANDROID PENTESTING SERIES PART 9 : SSL Pinning Bypass with Frida Server
  • ANDROID PENTESTING SERIES PART 6 : Setting up Android Pentest Lab

Categories

  • 0day
  • Android Pentesting
  • API Pentest
  • CAPTURE THE FLAG
  • CEH
  • EXPLOIT
  • GENERAL IT
  • LINUX SYS ADMIN
  • OWASP API TOP 10
  • OWASP TOP 10
  • PENTESTING
  • PROGRAMMING AND SCRIPTING
  • SYSTEM SECURITY
  • TOOLS
  • WEB SECURITY

Archives

  • July 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress