Webapp Pentesting

How to Perform Manual SQL Injection With Double Quotes Error-Based String Method

If you are trying to hack the databases with methods like single quotes error-based Manual SQL Injection, Integer based injection but…

2 years ago

How to Perform Manual SQL Injection While Pentesting With Single Quote Error-Based Parenthesis Method

If you are trying to hack the databases with methods like single quotes error-based injection, Integer based injection, or double quotes…

2 years ago

Google CTF 2023 – Rewards over $32,000 For Winners

CTF (Capture The Flag) exercises have existed for several years. These CTF exercises provide a great challenge and provide great…

2 years ago

How Can WAF Prevent OWASP Top 10?

The OWASP Top 10 security risks point out the common vulnerabilities seen in web applications. But it does not list…

2 years ago

Burp Suite 2022.5.1 Released – What’s New !!

Recently, PortSwigger has released a brand-new version of Burp Suite for Professional and Community users. The newly released version, Burp…

2 years ago

Kickstart Robust Cloud Security with the Industry’s Best Website Security Checklist

Website security checklist and cloud security best practices have made it to the top of the must-have lists of organizations…

3 years ago

Web Application Attacks – Types, Impact & Mitigation – Part-4

With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -4 we…

4 years ago

Web Application Attacks – Types, Impact & Mitigation – Part-3

With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -3 we…

4 years ago

Web Application Attacks – Types, Impact & Mitigation – Part-1

With this article, we list some of the common web application attacks, impacts, and possible mitigation. In part -1 we…

4 years ago

OWASP Top 10 Proactive Security Controls For Software Developers to Build Secure Software

Proactive Controls for Software developers describing the more critical areas that software developers must focus to develop a secure application.…

4 years ago