April 6, 2016

Category //

April 6, 2016

Cross-site Request Forgery (CSRF)

CSRF attacks manipulate the inability of the web applications to authenticate user access, putting entire networks at risk. This session-riding, which allows the hacker to use an active session of the victim to perform actions on his behalf without his

Read More »

Privacy Violation

Despite security regulations (OWASP Top-10, PCI DSS, HIPPA, MISRA, etc) that are being enforced in the various industrial sectors, privacy violation is still a common occurrence today. Passwords, certificates, credit card details, social security numbers, addresses, mobile numbers and email

Read More »

SQL Injection (SQLi)

SQL Injections, which have been appearing in the OWASP Top-10 for years, are basically unsanitized user input vulnerabilities. These maliciously complied SQL statements are used to illegally communicate with the application’s database for harvesting information, manipulating data and in many

Read More »

Cross-Site Scripting (XSS)

XSS attacks occur when malicious code is injected into trusted/well-known websites. It utilizes the user’s browser as its breeding ground, with the malware being transferred in the form of browser side scripts. XSS payloads trick the victim’s browser into executing

Read More »
Skip to content