top of page

HTTP RESPONSE AND OTHER METADATA

Distributed Abnormally Long request HTTP flood attacker volumetric attack, allien using a botnet “Zombie army”. It is bring down the...

Ovely permissive CORS

Origin header is sent by the browser in a CORS request and indicates that origin request. It may be spoofed outside the browser, so need...

Query Parameter SSL

URL contain a sensitive query parameter and stored in the browser history. Web application may be configured log the URL of all request....

Insecure HTTP Methods Enabled

Attacker sends a request of type "OPTIONS" to the Web server of your application to determine what HTTP methods are supported by the...

SALT, NONCE, RAINBOW

Salt A new salt (form of encryption) is randomly generated for each password. Setting a salt and a password are concatenated and...

Authentication and Authorization

· Authentication is the process of verifying who you are. When you log on to a PC with a user name and password you are authenticating. ·...

Symmetric & Asymmetric Encryption

Symmetric Encryption Symmetric encryption is the best-known technique. Use a secret key, which can be a number, word, or string of random...

Potential File Upload or File Upload

User want facility to upload the file. An attacker take the privilege of this facility to upload the malicious file. It have potential to...

Validation Rule

You can add input validation to Web Forms pages by using validation controls. To make sure that all the required parameters exist in a...

Denial of Service (DoS)

Denial of service attacks are most common to take website and servers down. It is easy to attack and hard to protect. The way to prevent...

Null byte Injection

It is also possible to pass the null character in the URL, which creates a vulnerability known as Null Byte Injection. In the URL it is...

Anti-CSRF and AJAX

The Form token is make problem for AJAX request, Ajax is send the JASON data not a HTML form because of this form token not be validated...

Clickjacking Attack and Prevention

This type of attack requires an attacker to use javascript. Attacker insists a user perform an undesired action by clicking on a...

Blind SQL Injection

It is nearly same as normal SQL injection but the difference is that it retrieved the data from the database. It asks a true and false...

SQL Injection

Nowadays SQL injection is a common attack that use malicious SQL injection code for database manipulation to access information. OR When...

1
2
bottom of page