Inconsistent security controls

Inconsistent security controls

Introduction Hello everyone, this is our 4th article focusing on business logic flaws. In this article, we will cover the lab “Inconsistent Security Controls” from PortSwigger Web Security. We will provide you with step-by-step practical … Read more

XML External Entity

XML External Entity Injection | XXE Injection

Introduction to XXE Attacks Before jumping into XXE attacks, you should know about XML (Extensible Markup Language). People use XML, a popular language for formatting data, for various purposes, ranging from web services (XML-RPC, SOAP, … Read more

UNDP Internship and Volunteer

Latest UNDP Internship and Volunteer Program In 2023

The UNDP Internship and Volunteer Programme 2023 is now accepting applications. The United Nations Development Programme (UNDP) offers paid internships to master’s, graduate, and undergraduate candidates from all over the world. Students are given a … Read more

Paid Internship at Nestle

Latest Paid Internship By Nestle 2023

Current openings for Paid Internship By Nestle 2023. Nestle is giving brand-new applicants a fantastic opportunity to get experience and learn new skills for their future advantages. This programme for paid internships is available to … Read more

Blind SSRF with out-of-band detection

Blind SSRF with out-of-band detection

Introduction This is our 5th article on Blind SSRF. In this lab, we will be solving the Blind SSRF with out-of-band detection lab. It is provided by PortSwigger Web Security for practice. Lab Description Lab … Read more

Blind SSRF with Shellshock Exploitation

Blind SSRF with Shell Shock Exploitation

Introduction In this article, we are going to solve the Blind SSRF with Shell Shock Exploitation lab. This is our 7th lab or 6th article on server-side request forgery. Lab Description This lab contains analytics … Read more

Web shell upload via extension blacklist

Web shell upload via extension blacklist bypass

Lab Description This is our 4th article on File Upload Vulnerabilities. Today we will learn(File upload vulnerabilities: Web shell upload via extension blacklist bypass) how to upload a web shell through the file upload functionality. … Read more

Web shell upload via path traversal

Web shell upload via path traversal

Introduction Web Shell upload via path traversal is a vulnerability that allows an attacker to upload their malicious shell into a web application through path traversal. In this type of attack, the attacker first identifies … Read more

File Upload Vulnerabilities

File Upload Vulnerabilities from Basic to Advanced

In this article, we are exploring file upload vulnerabilities from basic to advanced levels, including theoretical concepts and practical examples of seven PortSwigger labs. File upload vulnerabilities are vulnerabilities found in web applications. Attackers can … Read more