Category: Uncategorized

  • Blog
  • Category: Uncategorized
Insecure Direct Object Reference
Insecure Direct Object Reference
Insecure Direct Object Reference
Insecure Direct Object Reference

Insecure Direct Object Reference

Insecure Direct Object Reference is an access control check vulnerability in web applications in which the user can modify or access data objects by manipulating the identifiers (ID) in the web URL or user request sent to the server.

Unrestricted File Upload Challenge

Unrestricted file upload is a security vulnerability that allows an attacker to upload malicious files to server, it occurs when application does not properly validate the file type or its content.

Quick and Easy IoT Security for beginners

What is IoT? IoT stands for the “Internet of Things.” It refers to a network of interconnected physical devices or “things” that communicate and exchange data with each other over the internet. These devices can include everyday objects embedded with sensors, software, and other technologies, enabling them to collect and exchange data. The primary goal

CSRF CTF Challenge Nov-23 Solution

What is CSRF Cross Site request Forgery (CSRF) is a type of security vulnerability that occurs when an attacker tricks a user’s web browser into unintentionally making a request to a web application on which the user is authenticated. This can lead to the execution of unauthorized actions on behalf of the user without their