Introduction REST Stands for Representational State Transfer. It is a web standard based architecture which uses http protocol. RESTful Web Service is a lightweight, maintainable…
Introduction As we know that if web application does not return any visible error when the SQL query fails, then we use Boolean based SQL…
Introduction Sometimes there is no visible error message on the page when an SQL query fails, making it difficult for an attacker to get information…
Introduction Blind SQL (Structured Query Language) injection is a type of SQL Injection where the attacker asks the database true or false questions and determines…
Introduction Union-based SQLi is an in-band SQL injection technique that leverages the UNION SQL operator to combine the results of two or more SELECT statements…
Introduction Error based SQL injection is a technique of exploiting database servers, that relies on error messages thrown by the database server to obtain information…
Introduction SQL injection or SQLi is a web application security weakness that allows attackers to control an application’s database by tempering with the database query.…
Introduction Injection vulnerabilities occurs when web applications process untrusted user supplied data as a part of command or database query without performing any sanitization and…
Cryptographic Failures Cryptographic Failures refers to the failures related to cryptography which often lead to leak/exposure of sensitive data. In OWASP Top 10 2017 list…
Log4J Basics Apache Log4J is a java based logging library used in java applications. It is basically a logging framework which logs users and servers…