SQL Injection

Web Application Pentesting – Manual SQL Injection With Error Based String Method

SQL injection is the code injection techniques to gain access to the database(MySQL, MSSQL, Oracle etc).Owasp 2018 Release still describes this injection as A1...
OWASP Top 10 Proactive Security Controls For Software Developers to Build Secure Software

OWASP Top 10 Proactive Security Controls For Software Developers to Build Secure Software

Proactive Controls for Software developers describing the more critical areas that software developers must focus to develop a secure application.
Web Application Attacks part4

Web Application Attacks – Types, Impact & Mitigation – Part-4

With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -4 we are covering...
Web Applications Security

Web Applications Penetration Testing: Tact’s & Methodology

Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web applications determines...
hacker report

Hackers Earned More Than $19 Million in 2018 by Participating in Bug Bounty Programs

HackerOne published 2019 hacker report, which details the individuals that represent the HackerOne community. In the past year alone...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security