Category: Web Application Security

  • Blog
  • Category: Web Application Security
Oauth A Feature To Vulnerability
Oauth A Feature To Vulnerability
Oauth A Feature To Vulnerability
Oauth A Feature To Vulnerability

Oauth A Feature To Vulnerability

Introduction There have been a huge increase in the number of web services in recent years, and these services must collaborate. You might be asked to store files in your Google Drive by a third-party design software, or to provide your Google contacts by a Content Marketing application. It can be very dangerous to give

Dependency Confusion – A Supply Chain Attack

Dependency confusion is a vulnerability which gained popularity in 2021 when it was discovered by Alex Birson. It is one of the most impactful vulnerabilities amongst the existing vulnerabilities as its results are as heavy or even more than Remote Code Execution attack .  Dependency confusion uses the most common features of the well-known programming

HTTP REQUEST SMUGGLING PART-2

Welcome to the part 2 of exciting HTTP Request Smuggling vulnerability ! In case, you have missed part 1 then here’s link to the Basics Of HTTP Request Smuggling. So now, let’s get started with most thrilling ride of identifying and exploiting the HTTP Request Smuggling ! How to find HTTP request smuggling vulnerabilities? We

Basics Of HTTP Request Smuggling

HTTP request smuggling is old but very interesting vulnerability. In 2019 it was reborn by James Kettle. And from that time, HTTP request smuggling is gaining huge popularity among the security researchers in cyber world. Http request smuggling can lead to bypassing internal security controls, and this can further lead to gaining access to protected

Let’s Talk About How Can We Help You Securely Advance

Get A Free Quote
Basics Of HTTP Request Smuggling
Basics Of HTTP Request Smuggling