wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Some web vulnerabilities

profile
swap day
Oct 20, 2021
1 Like
0 Discussions
73 Reads

Internet is very vast and it connects world together.People like to use website and apps.For using most websites or apps we have to proveide our information.When that websites or apps are hacked and data is breached that time users data is not safe. Sometime web or apps need sensitive data like credit card details etc.By exploiting vulnerabilities Hacker can steal data, redirect users etc.

Xss is most common and exploitation results into session hijacking, access browser data etc.

SQL injection also known as sqli and it is most commonly used backend language for storing data.Hacker can gain full access of website or app by using this vulnerability.

Oauth is basically while using different applications or website for sign up or registration we have to give our other information like email id , Facebook credentials etc.

Insecure direct object reference is very critical for e-commerce ,social media etc.Here users supplied input direct takes as object reference.Hacker can aggressively hack data by developing script that takes data of all users.

So security is priority for all organization.Coders have to code well . Organization have to organise event for vulnerability findings.


Comments ()


Sign in

Read Next

Uniprocessor scheduling

Blog banner

Principles of Concurrency

Blog banner

Optimization of operating system design

Blog banner

Stories Woven in Silk: The Meaning Behind Patola Motifs

Blog banner

Types of email

Blog banner

E-security systems | CCTV

Blog banner

Big Data

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

PHISHING

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Memory Management

Blog banner

Music

Blog banner

Diwali

Blog banner

MY MOST THRILLED TREK ..... BHAIRAVGAD

Blog banner

Have You Explored India Yet?

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Security requirements for Safe E-Payments

Blog banner

Deadlock in operating system

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Evolution of operating systems

Blog banner

What is OS and its overview

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Understanding E-mail Servers

Blog banner

E-commerce

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Blockchain uses and use cases

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Cache Memory in Operating Systems

Blog banner

memory managment

Blog banner

Child labour

Blog banner

Design Considerations for Disk Cache Management

Blog banner

INSTAGRAM

Blog banner

Threads

Blog banner

Functions Of Operating Systems

Blog banner

Traditional UNIX Scheduling

Blog banner

Evolution of operating system

Blog banner

How to use GIT & GITHUB

Blog banner

Modern Operating system

Blog banner

Data carving - using hex editor

Blog banner

Best password managers: Reviews of the top products

Blog banner