Types of SQL Injection and Ways to Protect SQL Injection
SQL injection is one of essentially the most common cybersecurity threats and because the name suggests, it's a form of injection attack. Injection attacks, on...
Web Application Attacks – Part 2
In previous tutorial we realized about a number of the common web application attacks, impacts, and doable mitigation. In half -2 we're...
How To Fix The Damage Caused To website By A Hacker?
Are you conscious of the truth that, on common, 30,000 new web sites get hacked every day? Yes, that is true, and the second...
Web Application Attacks Part 1 – Types, Impact and Mitigation
Web attacks are very common nowadays, in recent days we have seen a large spike in web application attacks specially during COVID-19 pandemic where...
Exploiting Tomcat Manager without Metasploit
To exploit tomcat supervisor you usually want credentials. These might be the default username and password a lazy admin has left behind or they...
TraXSS – XSS Vulnerability Scanner Tutorial for Penetration Testers
Traxss is an automatic framework to scan URLs and webpages for XSS Vulnerabilities. It consists of over 575 Payloads to check with and a...