The reconnaissance and scanning phases of a penetration test are arguably the most important of the entire process. Without a clear understanding of the bigger picture and the avenues potentially available to you, you won’t be going very far at all. As part of this process, it’s very likely that you regularly come up against […]
in this article we are going to see top questions which can help you to crack your application security interview
Today we are going to see about what is vulnerability in web application security. What is Vulnerability? A vulnerability is a security hole in software or an operating system that provides a potential way or angle to attack the system. Basically, vulnerability is a weakness or flaw in a system. and a vulnerability can be […]
Quick Bite: Insecure Cryptographic Storage, Security Misconfiguration, Insecure Direct Object References, SQL Injection, Cross Site Scripting.