Cxnsxlecxnsxle.hashnode.dev·Jul 26, 2023Log Poisoning VulnerabilityWhat is Log Poisoning? Log poisoning is a cybersecurity attack technique aimed at manipulating or polluting the data collected in log files within a computer system or network. Log files are used to record various activities and events on a system, s...Discuss·1 like·38 readsowasp
Cxnsxlecxnsxle.hashnode.dev·Jul 19, 2023LFI VulnerabilityWhat is LFI? Local File Inclusion (LFI) is an attack technique in which we as attackers trick a web application into either running or exposing files on a web server. LFI attacks can expose sensitive information, and in severe cases, they can lead to...Discuss·28 readshacking