Nov 132 min readWeb Application SecurityWhat is session hijacking? How can it be achieved?Before going forward with session hijacking, let's deep dive into what a session is. A session is a unique token which establishes a...
Nov 131 min readInterview QuestionsWhat are cookie attributes? Explain HTTP-ONLY and HTTP-Secure.Cookies are small files that websites store on a user's computer to remember certain information about that user. Cookies can have...
Nov 133 min readWeb Application SecurityWhat is File Inclusion vulnerability and its types?File inclusion is a type of vulnerability that can exist in web applications. It occurs when a web application allows a user to include a...
Nov 132 min readWeb Application SecurityWhat is Cross site scripting and its mitigation?Cross site scripting (XSS) is an injection attack which is used to inject javascript code into input fields of a web application/ mobile...
Nov 132 min readWeb Application SecurityWhat is CSRF attack and its mitigation?CSRF or cross-site request forgery, also known as one click attack or session riding attack or XSRF. It is a web security vulnerability...
Nov 139 min readWeb Application SecurityWhat is SQLi and its mitigation?SQL injection (SQLi) is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to...
Nov 132 min readWeb Application SecurityDifference between get and post methodTo answer this, first let’s talk about HTTP Request methods. HTTP request methods specify the action that should be taken by the server...