SSRF with filter bypass via open redirection vulnerability

Server-side request Forgery allows an attacker to bypass network access control and make requests to servers located on the private network that are not reachable from the Internet. These techniques exploit the trust between servers or applications owned by the same entity to inject requests through the user interface, making...

Read More

SQL Injection

How to detect and exploit SQL Injection vulnerabilities. Structured Query Language (SQL) Injection, or SQLi, is a web security vulnerability that allows an attacker to interfere with queries an application performs to its database. This method will allow attackers to view data that is typically not accessible. This data may...

Read More