Jul 24, 2025 路 3 min read 路 Scenario You are tasked to perform a security assessment of a client's web application. For the assessment, the client has not provided you with credentials. Apply what you have learned in this module to obtain the flag. Walkthrough Navigate to the t...
Join discussion
May 12, 2024 路 3 min read 路 APIs (Application Programming Interfaces) are the backbone of modern software, enabling communication between different applications and services. However, the ubiquity of APIs also makes them a prime target for attackers. This comprehensive guide wi...
Join discussionJul 3, 2022 路 11 min read 路 IDOR - Background Info In our first example, what's stopping someone from checking another user's ID and getting all their information? This code example demonstrates how this can occur. The server is taking in the user's id and directly displays...
Join discussion
Mar 9, 2021 路 2 min read 路 Every cyber-security enthusiast has once come upon these terms OWASP Top 10. The Top 10 here means Top 10 Vulnerablities, the greatest software risks for any Web Application. OWASP is just an online community/non profit foundation that helps to impro...
Join discussion