In our previous post, we’ve explained the Local File Inclusion attack in detail, which you can read from here. I recommend, then, to revisit our
Every other web-application on the internet is somewhere or other running over a Content Management System, either they use WordPress, Squarespace, Joomla, or any other
In today’s digital landscape, merely having a strong password isn’t sufficient to safeguard user accounts. This article delves into the intricacies of a Broken Authentication
Isn’t it great if you get the privilege to run any system commands directly on the target’s server through its hosted web-application? Or you can
Grabbing a banner is the first and apparently the most important phase in both the offensive and defensive penetration testing environments. In this article, we’ll
In this deep down online world, dynamic web-applications are the ones that can easily be breached by an attacker due to their loosely written server-side
In this article, you will be learning how to compromise a WordPress website’s credentials using different brute-force techniques. Table of Content Pre-requisites WPscan Metasploit Burp
In this post, you will learn how to test security loopholes in Drupal CMS for any critical vulnerability which can cause great damage to any
Joomla is one of the popular Content Management System (CMS) which helps you to build your website. Joomla has gained its popularity by being user-friendly