top of page
Nov 13, 20242 min read
What is session hijacking? How can it be achieved?
Before going forward with session hijacking, let's deep dive into what a session is. A session is a unique token which establishes a...
7 views
Nov 13, 20241 min read
What are cookie attributes? Explain HTTP-ONLY and HTTP-Secure.
Cookies are small files that websites store on a user's computer to remember certain information about that user. Cookies can have...
7 views
Nov 13, 20243 min read
What is File Inclusion vulnerability and its types?
File inclusion is a type of vulnerability that can exist in web applications. It occurs when a web application allows a user to include a...
6 views
Nov 13, 20242 min read
What is Cross site scripting and its mitigation?
Cross site scripting (XSS) is an injection attack which is used to inject javascript code into input fields of a web application/ mobile...
3 views
Nov 13, 20242 min read
What is CSRF attack and its mitigation?
CSRF or cross-site request forgery, also known as one click attack or session riding attack or XSRF. It is a web security vulnerability...
2 views
Nov 13, 20249 min read
What is SQLi and its mitigation?
SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to...
1 view
Nov 13, 20242 min read
Difference between get and post method
To answer this, first let’s talk about HTTP Request methods. HTTP request methods specify the action that should be taken by the server...
2 views
bottom of page