Joel O.joelodey.hashnode.dev·Mar 25, 2024Lab: SQL injection attack, querying the database type and version on OracleTo exploit SQL injection, it's crucial to understand the structure of the database query. Use a payload to determine the number of columns returned by the query and identify columns containing text data. For instance, inject the following payload int...DiscussPortSwigger SQL injection (SQLi) Labs#sqlinjection
Precious Ugwupreshwrites.hashnode.dev·Mar 20, 2024Web Security Essentials: Shielding Your Front-End from Common ThreatsWeb security is crucial in the connected digital environment of today. Making sure the front-end is secure becomes increasingly important as organizations and people rely more and more on web apps. This article examines the fundamentals of online sec...Discusswebsecurity
Saurabh TiwariforBreachForcebreachforce.net·Mar 19, 2024Uncovering Web Cache Poisoning vs Web Cache DeceptionIntroduction : Embarking on a journey to demystify the world of Web Cache Poisoning vs Web Cache Deception, this blog aims to shed light on these cybersecurity threat in a way that is accessible to both the tech-savvy and those less familiar with the...Discuss·235 readswebcache
Joel O.joelodey.hashnode.dev·Mar 18, 2024Lab: SQL injection UNION attack, determining the number of columns returned by the querySQL injection is a serious security risk for web applications, and Burp Suite can be used to identify and address these vulnerabilities. This guide shows how to use Burp Suite to intercept and modify requests, specifically focusing on the product cat...DiscussPortSwigger SQL injection (SQLi) Labsportswigger
Martin Murjasmartinmurjas.hashnode.dev·Mar 12, 2024Securing Your Web Application — TokensIn today’s connected world, security is paramount for any web application handling user data. Proper authentication and authorization controls are essential to keep user information safe from compromise. In the previous article we started a simple we...DiscussJWT
Martin Murjasmartinmurjas.hashnode.dev·Mar 10, 2024Securing Your Web Applications — Getting Started with OAuth AuthenticationIn recent years, many websites and applications provide the option to sign in using existing accounts you’ve created with companies like Google, Apple, or LinkedIn. This simplified sign-in process enhances the user experience by allowing customers to...Discussoauth
N1ghtm4r3n1ghtm4r3.hashnode.dev·Mar 10, 2024OAuth Unmasked: Exposing Vulnerabilities and AttacksOAuth 101 OAuth, which stands for "Open Authorization," is an open-standard authorization protocol or framework that enables secure authorization of third-party applications or services to access a user's resources without exposing the user's credent...Discuss·60 readswebsecurity
Priya Mervanasslinsights.hashnode.dev·Mar 9, 2024Understanding Port 443: What It Is and Why It Matters for Web SecurityIn the vast expanse of the internet, where data flows like a digital river, security is paramount. One crucial aspect of this security lies in the realm of ports, those virtual gateways that facilitate communication between your computer and servers ...DiscussSecurity
Subham Manisubham-mani.hashnode.dev·Mar 8, 2024Web Tokens DemystifiedIn the dynamic realm of web authentication, understanding the mechanisms behind access tokens and refresh tokens can unlock a world of secure, seamless user experiences. Okay so what are they? 🤔 🔑 Access Tokens: Think of them as a VIP pass for an e...DiscussJWT token,JSON Web,Token,Token authentication,Access token,JSON token,JWT security,JWT authentication,Token-based authentication,JWT decoding,JWT implementation
Sober Summyblog.summy.dev·Mar 6, 2024Reverse Tab-nabbing — Links and Its Security loopWell, all the webpages in the web became cool because we could link one page to another right ? This is made possible by the good old ‘Anchor Tag’ (<a>), what could possibly go wrong using an anchor tag? Well, some security concerns are associated wi...Discuss·10 likeswebsecurity