Author: Varad Magare

  • Blog
  • Author: Varad Magare
Dependency Confusion – A Supply Chain Attack
Dependency Confusion – A Supply Chain Attack
Dependency Confusion – A Supply Chain Attack
Dependency Confusion – A Supply Chain Attack

Dependency Confusion – A Supply Chain Attack

Dependency confusion is a vulnerability which gained popularity in 2021 when it was discovered by Alex Birson. It is one of the most impactful vulnerabilities amongst the existing vulnerabilities as its results are as heavy or even more than Remote Code Execution attack .  Dependency confusion uses the most common features of the well-known programming

HTTP REQUEST SMUGGLING PART-2

Welcome to the part 2 of exciting HTTP Request Smuggling vulnerability ! In case, you have missed part 1 then here’s link to the Basics Of HTTP Request Smuggling. So now, let’s get started with most thrilling ride of identifying and exploiting the HTTP Request Smuggling ! How to find HTTP request smuggling vulnerabilities? We

Basics Of HTTP Request Smuggling

HTTP request smuggling is old but very interesting vulnerability. In 2019 it was reborn by James Kettle. And from that time, HTTP request smuggling is gaining huge popularity among the security researchers in cyber world. Http request smuggling can lead to bypassing internal security controls, and this can further lead to gaining access to protected

A GUIDE TO SERVER SIDE REQUEST FORGERY(SSRF)

Finding a SSRF can be a pretty tough task ! So the climbing the Everest ! But people do climb ! What do they do? They climb in steps ! That’s exactly what we are gonna do. We will learn SSRF in steps! Introduction To SSRF So, SSRF abbreviation of Server Side Request Forgery is type of vulnerability that tries

Let’s Talk About How Can We Help You Securely Advance

Get A Free Quote
A GUIDE TO SERVER SIDE REQUEST FORGERY(SSRF)
A GUIDE TO SERVER SIDE REQUEST FORGERY(SSRF)