CALL US

+91 9116117170

Category: Web Application Security

Rules of Bug Bounty

By Devashish Soni 0 Comment April 2, 2020

Targeting a Bug Bounty Program How long you target a program? “some hours or a night” if this is your answer Then That’s where you are doing everything wrong. Bug Hunting is Matter of Luck and Skill’s .Spending just a few hours on a program could be waste of time Because those bugs are mostly […]

NordVPN Patches Flaw That Exposed Users’ Details

By Aneesh A S 0 Comment March 11, 2020

NordVPN, one of the most popular VPN services, has fixed a security flaw that existed in its payment systems. The vulnerability is said to have exposed customers’ email addresses and other information.  The vulnerability was linked to the three payment platforms ,  Momo, Gocardless, and Coinpayments ; used by NordVPN. The flaw was disclosed by […]

Abusing the AWS Metadata services using SSRF

By Devashish Soni 0 Comment March 5, 2020

What is AWS AWS stands for amazon web services. It is a platform that offers reliable, flexible, easy-to-use, cost-effective and scalable cloud computing solutions. What is SSRF SSRF stands for Server-Side Request Forgery. It is a vulnerability that let’s an attacker send crafted requests from the back-end server of a vulnerable web application. Attackers usually […]

How to Automate IDOR using BurpSuit

By Devashish Soni 0 Comment February 28, 2020

What is IDOR IDOR stands for ‘Insecure Direct Object Reference’. It is a security vulnerability in which a user is able to change data or can access data of another users. IDOR occurs when the internal implementation of an object is done without proper validation mechanism which allow an attacker to gain access to these […]

Security in web development

By Annu Choudhari 0 Comment July 16, 2019

The essential guide to secure web development Developing secure and reliable cloud-based web applications is very, very difficult. If you think otherwise, you are either not of this world, or your life has not yet taught you a lesson.  If you have already become infected with the idea of ​​a “minimum viable product”. And consider […]

error: Content is protected by Cyberops !!