top of page
What is session hijacking? How can it be achieved?
Before going forward with session hijacking, let's deep dive into what a session is. A session is a unique token which establishes a...
Nov 13, 20242 min read
Â
Â
What are cookie attributes? Explain HTTP-ONLY and HTTP-Secure.
Cookies are small files that websites store on a user's computer to remember certain information about that user. Cookies can have...
Nov 13, 20241 min read
Â
Â
What is File Inclusion vulnerability and its types?
File inclusion is a type of vulnerability that can exist in web applications. It occurs when a web application allows a user to include a...
Nov 13, 20243 min read
Â
Â
What is Cross site scripting and its mitigation?
Cross site scripting (XSS) is an injection attack which is used to inject javascript code into input fields of a web application/ mobile...
Nov 13, 20242 min read
Â
Â
What is CSRF attack and its mitigation?
CSRF or cross-site request forgery, also known as one click attack or session riding attack or XSRF. It is a web security vulnerability...
Nov 13, 20242 min read
Â
Â
What is SQLi and its mitigation?
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to...
Nov 13, 20249 min read
Â
Â
Difference between get and post method
To answer this, first let’s talk about HTTP Request methods. HTTP request methods specify the action that should be taken by the server...
Nov 13, 20242 min read
Â
Â
bottom of page