CALL US

+91 9116117170

Category: Web Application Security

What is JSON Web Token (JWT)?

By Vedant Jain 0 Comment May 24, 2021

Token-Based Authentication The token-based authentication systems allow users to enter their username and password in order to obtain a token which allows them to fetch a specific resource without entering their username and password at each request. JSON Web Token JWT is also know as JSON Web Token. JWT is a way to communicate between […]

What is CSV Injection?

By Vedant Jain 0 Comment May 18, 2021

The Full form of CSV is Comma Separated Values which basically used for storing data in form Tables (Columns & Rows) in the plain text format. An overview of CSV Injection commonly known as formula Injection comes when websites embedded untrusted input inside CSV files a lot times these formulas are caused because of certain […]

Rules of Bug Bounty

By Devashish Soni 0 Comment April 2, 2020

Targeting a Bug Bounty Program How long you target a program? “some hours or a night” if this is your answer Then That’s where you are doing everything wrong. Bug Hunting is Matter of Luck and Skill’s .Spending just a few hours on a program could be waste of time Because those bugs are mostly […]

NordVPN Patches Flaw That Exposed Users’ Details

By Aneesh A S 0 Comment March 11, 2020

NordVPN, one of the most popular VPN services, has fixed a security flaw that existed in its payment systems. The vulnerability is said to have exposed customers’ email addresses and other information.  The vulnerability was linked to the three payment platforms ,  Momo, Gocardless, and Coinpayments ; used by NordVPN. The flaw was disclosed by […]

Abusing the AWS Metadata services using SSRF

By Devashish Soni 0 Comment March 5, 2020

What is AWS AWS stands for amazon web services. It is a platform that offers reliable, flexible, easy-to-use, cost-effective and scalable cloud computing solutions. What is SSRF SSRF stands for Server-Side Request Forgery. It is a vulnerability that let’s an attacker send crafted requests from the back-end server of a vulnerable web application. Attackers usually […]

error: Content is protected by Cyberops !!