Targeting a Bug Bounty Program How long you target a program? “some hours or a night” if this is your answer Then That’s where you are doing everything wrong. Bug Hunting is Matter of Luck and Skill’s .Spending just a few hours on a program could be waste of time Because those bugs are mostly […]
Google hacking or Google dorking is an advance google search technique for information gathering. These search queries can be used to gather information for arbitrary or individual targets, identify security vulnerabilities in web applications, discover files containing credentials and other sensitive data, discover error messages disclosing sensitive information Before we Begin: Before we start what […]
What is AWS AWS stands for amazon web services. It is a platform that offers reliable, flexible, easy-to-use, cost-effective and scalable cloud computing solutions. What is SSRF SSRF stands for Server-Side Request Forgery. It is a vulnerability that let’s an attacker send crafted requests from the back-end server of a vulnerable web application. Attackers usually […]
Keyloggers can be built using a smartphone’s gyroscope sensor and how Android users can be safeguarded.
By Aneesh A S
All smartphones are equipped with a sensor called gyroscope. It determines the precise direction of the device`s tilt. This can be used to automatically activate some functions like auto-rotate screen , handling a vehicle in a racing game and many more. These sensors are becoming more precise as smartphones evolve. Two researchers from UC Davis […]
What is IDOR IDOR stands for ‘Insecure Direct Object Reference’. It is a security vulnerability in which a user is able to change data or can access data of another users. IDOR occurs when the internal implementation of an object is done without proper validation mechanism which allow an attacker to gain access to these […]