fbpx
Home XSS

XSS

7 Most Common Web Application Vulnerabilities

Information disclosure, identity theft, SQL injection, Code injection, Authentication bypass, Cross site scripting and Cross request forgery. Typo3 has...

GoLISMERO The Web Knife – Web Application Mapping Tool

Web application generally at the hit list of hackers and different hackers use different technique to find the bug (vulnerability)...

Session Cookie Based Sql Injection Tutorial

SQL injection is most dangerous attack for web application, there are a lot of different websites are vulnerable to SQL injection. There are different...

Grendel Scan Web Application Security Scanner

Web application security scanners are very important in the process of penetration testing, if you want to test your web...

SEO Poisoning Attack – What and How

Search engine optimization contains different techniques and tools to improve the visibility of a URL on the web search engine, SEO among social media...

WebCruiser-Web Vulnerability Scanner

There are different web application security scanners available from both open source and commercial product, choice is your which vulnerability scanner is the best...

WebSurgery- Web Application Security Tool

Web application security is one of the key point to measure the security of a company profile. Website is very important, if the website...

Cross-Site Scripting Framework- XSSF

Cross site scripting (XSS) is a rising problem for web application, an attacker may be exploit XSS bug and take some advantages that will...

Exploit Me- Firefox Add Ons For Pen Testing

Web site security is the key point to measure the security of the network, by this point I mean that your website represent the...

Firefuzzer- A Penetration Testing Tool

There are different ways and causes to hack and deface a website but as a web administrator and security analyst you have to make...

Gamja-Web Vulnerability Scanner

As there are so many different articles and tools has been posted on web application security, this article will also cover some about penetration...

Paros Proxy-Web Application Security Assessment

Paros proxy is a web application security assessment tool used to measure the security of a web application. It allows you to see what...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...