Since 2013, the OWASP Top 10 Web application security risks list ranks Insecure Direct Object References (IDOR) fourth. This vulnerability allows an authorized user to
HTTP (Hyper Text Transfer Protocol) is basically a client-server protocol, wherein the client (web browser) makes a request to the server and in return, the
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
Hello friends! Today we are doing web penetration testing using burp suite spider which very rapidly crawls entire web application and dumps the formation of
In our previous article you have learned the basic concepts of SQL injection but in some scenarios. You will find that your basic knowledge and
This article will describe the different type of process involves in encoding of data. The term encoded data means wrapped data, and the process of
Hello friends! Today we are going to share a new article related to how to bypass window 10 UAC once you have hacked the victim’s
In our previous article we had performed Form Based SQL injection using sqlmap but today we are going to perform Form Based SQL injection in
Open command prompt and check windows user account status using “whoami” command. Account name is “joe” and account status is ‘DefaultAccount’ which is a non-administrator