💥 Server-Side Parameter Pollution (SSPP): The Silent Threat Lurking in Your APIs“You sanitized input. You validated types. But did you check what happens when an attacker sends the same parameter twice?”3d ago3d ago
Unlocking the Secrets of Digital Forensics: The Science of Solving Cyber CrimesAfter spending valuable time researching digital forensics, I realized I had only scratched the surface of this intriguing field. The more…Aug 30, 2024Aug 30, 2024
Wi-Fi Hacking using Evil Twin Attacks and Captive Portals! — Part 4In this section, I’m going to teach you how to enable a captive board to log in page on your access point. So, first, off I will open the…Feb 7, 2021Feb 7, 2021
Wi-Fi Hacking using Evil Twin Attacks and Captive Portals! — Part 3Okay so in this section I’m going to show you how to sniff and inject packets into a wireless network. So, first off, I need to scan all…Feb 4, 2021Feb 4, 2021
Wi-Fi Hacking using Evil Twin Attacks and Captive Portals! — Part 2In this section [part 2] you will learn which wireless adapter you should buy for wireless penetration testing. So, to echo the Wi-Fi…Feb 4, 2021Feb 4, 2021
Wi-Fi Hacking using Evil Twin Attacks and Captive Portals! — Part 1MMMMMMMMMMMM!!!Jan 29, 2021Jan 29, 2021
SYNCHRONIZED TOKEN PATTERNImplementing Mitigation Methods For CSRF Attack — SYNCHRONIZED TOKEN PATTERNDec 27, 2020Dec 27, 2020
DOUBLE SUBMIT COOKIES PATTERNImplementing Mitigation Methods For CSRF Attack — DOUBLE SUBMIT COOKIE PATTERNDec 25, 2020Dec 25, 2020
What are Cookies?HTTP cookies are essential to the modern Internet but a vulnerability to your privacy. As a necessary part of web browsing, HTTP cookies…Dec 24, 2020Dec 24, 2020