BufferOverflow
-
Understanding Same Origin Policy (SOP) and Cookies: A Practical Lab Guide
In today’s interconnected web landscape, security measures like Same Origin Policy (SOP) and cookie management play pivotal roles in safeguarding user data and ensuring secure interactions between web applications. This lab guide provides…
-
Web Application Attacks
Here are some common web application attacks, each explained with examples: 1. SQL Injection Description: Attacker inserts or manipulates SQL queries to execute arbitrary commands on the database. Example:Input: ' OR '1'='1Query: SELECT…
-
WEB APPLICATION PENTESTING CHECKLIST
Broken Access Control Cryptographic Failures Injection Insecure Design Security Misconfiguration Vulnerable and Outdated Components Identification and Authentication Failures Software and Data Integrity Failures Security Logging and Monitoring Failures :** Ensure that security-relevant events,…
-
ARP Poisoning
ARP (Address Resolution Protocol) poisoning, also known as ARP spoofing, is a network attack in which an attacker sends false (spoofed) Address Resolution Protocol messages to the local area network. The goal of…
-
MAC Flooding: Understanding the Attack
MAC flooding is a network attack that exploits the limitations of network switches by flooding the switch’s MAC address table. This attack aims to overload the table, causing the switch to operate in…
-
FTP and how to Pentest FTP
FTP stands for File Transfer Protocol. It is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. FTP is commonly used…