Define Broken Access Control Broken Access Control : In a web application the broken access control vulnerability arises when the application fails to properly validate…
Introduction CORS or Cross-origin Resource Sharing allows web developers to work around the same-origin policy. The CORS standard describes new HTTP headers which provide browsers…
Introduction A Direct Object Reference is a web application design method in which entity names are used to identify application-controlled resources that are passed in…
Introduction The CSRF or Cross Site Request Forgery is a web vulnerability, where an attacker tricks the victim’s browser to send forged requests to a…
Metasploit Basics Metasploit is an Open Source Exploitation Framework developed by Rapid7, used for simulated attack during penetration testing. It provides a platform and tooling…