Skip to content

AppSec, Network Security, Penetration Testing, Bug Bounties, Coding and more..

Menu
  • Home
  • OWASP TOP 10
    • OWASP TOP 10
    • OWASP API TOP 10
    • OWASP MOBILE TOP 10
    • SANS TOP 25
  • PENTESTING
    • WEB SECURITY
    • Web App Pentest
    • API Pentest
    • Android Pentesting
    • 0day
    • Windows Pentesting
    • Linux Pentesting
    • Active Directory Pentest
    • Linux Priv-Escalation
    • Windows Priv-Escalation
  • Coding
    • GoLang
    • Python
    • PowerShell
    • Bash Scripting
    • Batch Scripting
    • Java
  • Network Study
    • Networking Basics
    • TCP-IP/OSI Model
    • Essential Protocols
  • CTF
    • Vuln-Hub
  • Certification
    • CEH
  • My Tools
  • Portfolio

Category: WEB SECURITY

Posts related to Web Application Security

Posted onDecember 26, 2021July 7, 2022CEH, OWASP TOP 10, PENTESTING, WEB SECURITY

Cryptographic Failures in Web Applications | A02 – OWASP TOP 10 2021

by AdminLeave a comment on Cryptographic Failures in Web Applications | A02 – OWASP TOP 10 2021

Cryptographic Failures Cryptographic Failures refers to the failures related to cryptography which often lead to leak/exposure of sensitive data. In OWASP Top 10 2017 list…

Read More
Posted onDecember 23, 2021December 23, 20210day, EXPLOIT, PENTESTING, WEB SECURITY

Log4J Vulnerability Explained – CVE-2021-44228

by AdminLeave a comment on Log4J Vulnerability Explained – CVE-2021-44228

Log4J Basics Apache Log4J is a java based logging library used in java applications. It is basically a logging framework which logs users and servers…

Read More
Posted onDecember 22, 2021December 22, 2021CEH, OWASP TOP 10, PENTESTING, WEB SECURITY

Broken Access Control Vulnerability Basics | A01 – OWASP TOP 10 2021

by AdminLeave a comment on Broken Access Control Vulnerability Basics | A01 – OWASP TOP 10 2021

Define Broken Access Control Broken Access Control : In a web application the broken access control vulnerability arises when the application fails to properly validate…

Read More
Posted onDecember 14, 2021December 14, 2021OWASP TOP 10, PENTESTING, WEB SECURITY

CORS Misconfiguration Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

by AdminLeave a comment on CORS Misconfiguration Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

Introduction CORS or Cross-origin Resource Sharing allows web developers to work around the same-origin policy. The CORS standard describes new HTTP headers which provide browsers…

Read More
Posted onDecember 12, 2021December 12, 2021OWASP TOP 10, PENTESTING, WEB SECURITY

IDOR Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

by AdminLeave a comment on IDOR Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

Introduction A Direct Object Reference is a web application design method in which entity names are used to identify application-controlled resources that are passed in…

Read More
Posted onDecember 11, 2021December 11, 2021OWASP TOP 10, PENTESTING, WEB SECURITY

CSRF Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

by AdminLeave a comment on CSRF Vulnerability Explained | OWASP TOP 10 2021 : Broken Access Control

Introduction The CSRF or Cross Site Request Forgery is a web vulnerability, where an attacker tricks the victim’s browser to send forged requests to a…

Read More
Posted onOctober 27, 2021October 27, 2021WEB SECURITY

Remote File Inclusion Attacks on Web-Application | RFI Attacks

by AdminLeave a comment on Remote File Inclusion Attacks on Web-Application | RFI Attacks

RFI stands for Remote File Inclusion, this vulnerability allows an attacker to dynamically include files/scripts from remote/external sources into the web server. This vulnerability occurs…

Read More
Posted onOctober 27, 2021October 27, 2021TOOLS, WEB SECURITY

fimap : tool for exploiting Remote/Local File Inclusion vulnerability | LFI Attacks

by AdminLeave a comment on fimap : tool for exploiting Remote/Local File Inclusion vulnerability | LFI Attacks

fimap is an LFI/RFI detection and exploitation tool written in python which can find, prepare, audit, exploit and even google automatically for local and remote…

Read More
Posted onOctober 27, 2021October 27, 2021WEB SECURITY

Exploiting Local File Inclusion (LFI ) vulnerability with /proc/self/environ method | LFI Attacks

by AdminLeave a comment on Exploiting Local File Inclusion (LFI ) vulnerability with /proc/self/environ method | LFI Attacks

In this post we are going to see, how an attacker can exploit LFI vulnerability to to achieve code execution by the use of /proc/self/environ…

Read More
Posted onOctober 27, 2021October 27, 2021WEB SECURITY

Introduction to Local File Inclusion Attacks | LFI | Path Traversal | Directory Traversal

by AdminLeave a comment on Introduction to Local File Inclusion Attacks | LFI | Path Traversal | Directory Traversal

Introduction The LFI stands for Local File Inclusion, it allows an attacker to include files that exist (available locally) on the target web server. This…

Read More

Posts navigation

Previous Page Page 1 Page 2 Page 3 Next Page

About Me

Hi, My name is Ajay Kumar Tekam, I am a Cyber Security Enthusiast and currently looking for opportunity to work in cyber security positions. The area of my interests are Web Pentesting, Mobile Application Pentesting and Network Pentesting. Currently i do bog hunting at bugcrowd.com as a freelancer. In my free time i write security automation tools in python, GoLang and Bash. You can find my portfolio, CV and more about me at ajaytekam.github.io

Recent Posts

  • CERTIFIED ETHICAL HACKER MODULE 03 : Network Scanning
  • Certified Ethical Hacker Module 02 : Footprinting and Reconnaissance
  • ANDROID PENTESTING SERIES PART 7 : Static Application Analysis
  • AJAX Crash Course for WebApp Security
  • Certified Ethical Hacker Module 01 : Introduction To Ethical Hacking

Categories

  • 0day
  • Android Pentesting
  • API Pentest
  • CAPTURE THE FLAG
  • CEH
  • Certification
  • EXPLOIT
  • GENERAL IT
  • InfoSec Certs.
  • LINUX SYS ADMIN
  • OWASP API TOP 10
  • OWASP TOP 10
  • PENTESTING
  • PROGRAMMING AND SCRIPTING
  • SYSTEM SECURITY
  • TOOLS
  • Uncategorized
  • WEB SECURITY

Archives

  • September 2022
  • August 2022
  • July 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
Amphibious Theme by TemplatePocket ⋅ Powered by WordPress