CALL US

+91 9116117170

Category: Web Application Security

NordVPN Patches Flaw That Exposed Users’ Details

By Aneesh A S 0 Comment March 11, 2020

NordVPN, one of the most popular VPN services, has fixed a security flaw that existed in its payment systems. The vulnerability is said to have exposed customers’ email addresses and other information.  The vulnerability was linked to the three payment platforms ,  Momo, Gocardless, and Coinpayments ; used by NordVPN. The flaw was disclosed by […]

Abusing the AWS Metadata services using SSRF

By Devashish Soni 0 Comment March 5, 2020

What is AWS AWS stands for amazon web services. It is a platform that offers reliable, flexible, easy-to-use, cost-effective and scalable cloud computing solutions. What is SSRF SSRF stands for Server-Side Request Forgery. It is a vulnerability that let’s an attacker send crafted requests from the back-end server of a vulnerable web application. Attackers usually […]

How to Automate IDOR using BurpSuit

By Devashish Soni 0 Comment February 28, 2020

What is IDOR IDOR stands for ‘Insecure Direct Object Reference’. It is a security vulnerability in which a user is able to change data or can access data of another users. IDOR occurs when the internal implementation of an object is done without proper validation mechanism which allow an attacker to gain access to these […]

Security in web development

By Annu Choudhari 0 Comment July 16, 2019

The essential guide to secure web development Developing secure and reliable cloud-based web applications is very, very difficult. If you think otherwise, you are either not of this world, or your life has not yet taught you a lesson.  If you have already become infected with the idea of ​​a “minimum viable product”. And consider […]

Owasp Top 10:A6: Security Misconfigurations (Impact & Mitigation)

By Annu Choudhari 0 Comment July 11, 2019

What does mean by Security Misconfigurations ? Security Misconfigurations arises when maintaining security settings are the default, Security misconfigurations can happen at any level of an application stack, including the platform, web server, application server, database, framework, and custom code.Security misconfigurations vulnerabilities could occur if a component is vulnerable to attack due to an insecure […]

error: Content is protected by Cyberops !!