top of page
Privilege escalation practical example with mitigations.
In role based applications, a penetration tester should always ensure that he tests for privilege escalation. Let's take an example of a...
Nov 18, 20241 min read
10 views
What are the authorization test cases?
1. Insecure Direct Object References (IDOR) : Imagine you have a web application where each user has an account page with a unique number...
Nov 18, 20246 min read
1 view
How will you test Forgot password functionality ? and what are common issues
Verify that the "Forgot Password" link/button is prominently displayed on the login page. Check that the user is directed to the correct...
Nov 18, 20241 min read
4 views
How to install DVWA in Kali Linux?
Following tutorial demonstrates a simple way of installing DVWA in Kali https://www.youtube.com/watch?v=PaB17Cc0dUg
Nov 18, 20241 min read
49 views
How do you attack a login page?
Test Cases: Here are the following ways in which we can attack a login page: Source Code and Wappalyzer - Using source code, it might be...
Nov 18, 20242 min read
0 views
What is Parameter pollution?
Parameter pollution is a security vulnerability that can occur in web applications when user supplied data, such as query parameters,...
Nov 18, 20241 min read
1 view
What are the test cases for an ecommerce website and Banking website
Before we start with the test cases for the Banking website, let’s understand the functionality of Banking web app: The banking web...
Nov 15, 20243 min read
2 views
Explain different HTTP methods: PUT,PATCH,DELETE,POST,GET,TRACE,TRACK,OPTIONS
PUT: This method is used to update an existing resource on a web server. For example, if you want to update a user's profile information,...
Nov 15, 20241 min read
3 views
OWASP top 10 explained for dummies?
Open Web Application Security Project (OWASP) is a non-profit organization dedicated to address security threats. They address top 10...
Nov 13, 20245 min read
11 views
What is XXE and its mitigation?
XXE stands for XML External Entity and before we understand the attack, lets understand what is XML first: XML (eXtensible Markup...
Nov 13, 20242 min read
5 views
bottom of page