Tag: OWSAP

Scanning for OWASP Top 10 With w3af – An Open-source Web Application Security Scanner

Scanning for OWASP Top 10 With w3af – An Open-source Web Application Security Scanner

w3af is an open-source web application security scanner (OWASP Top 10) which enables developers and penetration testers to distinguish and exploit vulnerabilities...
Unvalidated Redirects and Forwards

OWASP A10-Unvalidated Redirects and Forwards

Web applications often redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers...
A-9 Using Components with known Vulnerabilities

A-9 Using Components with known Vulnerabilities – Every Developers Should aware

Exploitability of the riskĀ is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk is widely spread, Many application...
Cross Site Request Forgery

A8-Cross-Site Request Forgery (CSRF)

Cross Site Request Forgery is one of the most common form of attack by online spammers and scammers. Exploicity of this attack is bit...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security