Hi , I am Indrayan, a cybersecurity consultant with over 3+ years of experience. Here, I will share my knowledge on application security methodologies and best practices for securing applications.
In today’s fast-paced digital world, mobile applications have become integral to everyday life. With millions of users relying on their smartphones,...
Let's hack it.............................................. · Continuing with XML Signature Wrapping (XSW)… XML Signature Wrapping (XSW) : Description :...
Let's hack it.............................................. · Continuing with our test cases that needs to validate when performing pen testing the...
SQLmap is one of the most popular and powerful open-source tools used for automating SQL injection (SQLi) detection and exploitation. It provides a...
Definition : SQL Injection (SQLi) is a type of attack that allows an attacker to execute arbitrary SQL queries against a database, typically through a...
Let’s Hack it…………….. · Required Tools : SAML Raider - burp extension (Includes “SAML Raider certificates” tab) SAML Editor - burp extension SAML...