Category: Security

  • Blog
  • Category: Security

Authentication and Authorization

As you recursively visit your local bank, there is a possibility that the bankers will recognize you by looking at you. Yes, we can call this a form of authentication. But as the world moves toward digitization, the methods of authentication are changing as well. Now, we have to log in to our national bank’s

Read More

Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference (IDOR) was listed in the OWASP (Open Web Application Security Project) Top 10 back in 2007 and currently falls under the A5 Broken Access Control category. Idor has been part of the Top 10 vulnerabilities throughout the decade. In Insecure direct object reference an unauthorized request is being made to access

Read More

Oauth A Feature To Vulnerability

Introduction There have been a huge increase in the number of web services in recent years, and these services must collaborate. You might be asked to store files in your Google Drive by a third-party design software, or to provide your Google contacts by a Content Marketing application. It can be very dangerous to give

Read More

Dependency Confusion – A Supply Chain Attack

Dependency confusion is a vulnerability which gained popularity in 2021 when it was discovered by Alex Birson. It is one of the most impactful vulnerabilities amongst the existing vulnerabilities as its results are as heavy or even more than Remote Code Execution attack .  Dependency confusion uses the most common features of the well-known programming

Read More