hacker report

Hackers Earned More Than $19 Million in 2018 by Participating in Bug Bounty Programs

HackerOne published 2019 hacker report, which details the individuals that represent the HackerOne community. In the past year alone...

Scanning for OWASP Top 10 Vulnerabilities with Metasploit for the Web(w3af)

w3af is an open source web application security scanner (OWASP Top 10) which enables developers and penetration testers to distinguish and exploit...
SQL Injection

Web Application Pentesting – Manual SQL Injection With Error Based String Method

SQL injection is the code injection techniques to gain access to the database(MySQL, MSSQL, Oracle etc).Owasp 2018 Release still describes this injection as A1...
SQL Injection

Web Application Pentesting with Manual SQL Injection – Integer Based

Today we will perform manual SQL injection with integer based method for the MySQL database. I hope the last article on error...
Web Applications Security

Web Applications Penetration Testing: Tact’s & Methodology

Web Applications Security becomes essential as more and more data gets stored in web applications. As such, testing of web applications determines...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security