SQL Injection

How to Perform Manual SQL Injection With Double quotes Error Based String Method

If you are trying to hack the databases with methods like single quotes error based injection, Integer based injection but the databases are not vulnerable to those methods injection will fail and you cannot connect with database. In short, the error based...
Web Application Firewall

Gartner Released Magic Quadrant for Web Application Firewalls – Imperva WAF Selected as a...

Currently Web Application Firewall performing a major role in  Web application protection since the web applications are primary targets for cybercriminals and the impact that occurs due to cyber attack is unbearable one for any of the organization and...

Scanning for OWASP Top 10 Vulnerabilities with Metasploit for the Web(w3af)

w3af is an open source web application security scanner (OWASP Top 10) which enables developers and penetration testers to distinguish and exploit vulnerabilities in their web applications. This tool also provides GUI framework but sadly most of the time GUI...
Top 10 Proactive Controls

OWASP Released Top 10 Proactive Controls that Software Developers to Keep in Mind

OWASP released Top 10 Proactive Controls for Software developers describing the more critical areas that software developers must focus on. The OWASP Top 10 Proactive Controls 2018 contains a list of security techniques that every developer should consider for every...
Burp Extension Replicator

New Valuable Burp Extension that helps Developers to Reproduce Issues Detected by Pentesters

Burp is one of the most famous tool used by pentesters, which incorporates a full static code investigation engine to discover vulnerabilities. PortSwigger Security released a new Burp Extension Replicator. The graphical tool is composed in Java and it was Created PortSwigger Security....

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended