SSRF with filter bypass via open redirection vulnerability
Server-side request Forgery allows an attacker to bypass network access control and make requests to servers located on the private network that are not reachable from the Internet. These techniques exploit the trust between servers or applications owned by the same entity to inject requests through the user interface, making...
Read MoreSQL Injection
How to detect and exploit SQL Injection vulnerabilities. Structured Query Language (SQL) Injection, or SQLi, is a web security vulnerability that allows an attacker to interfere with queries an application performs to its database. This method will allow attackers to view data that is typically not accessible. This data may...
Read MoreIDORs: What are they and how to find them
How to find and exploit IDOR vulnerabilities in a web application giving you access to data you shouldn’t have.
Read More