Home
cyberkhalid
Cancel

Broken Authentication -> Unencrypted Communication

Broken Authentication -> Unencrypted Communication If application allows users to connect to it over unencrypted connections(http). An attacker suitably positioned to view a legitimate user’s n...

Broken Authentication -> Forgot Password - Bad Questions

Broken Authentication -> Forgot Password - Bad Questions A security question is form of shared secret used as an authenticator. It is used as an extra security layer. Exploitation This weba...

Session hijacking -> Predictable session token

Session hijacking : Predictable session token Session prediction attack focuses on predicting session ID values that permit an attacker to bypass the authentication schema of an application. By an...

Broken Authentication -> Bruteforce

Broken Authentication : Bruteforce A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping ...

Broken Access Control -> IDOR -> Order

Broken Access Control: IDOR -> Order Insecure Direct Object References (IDOR) occur when an application provides direct access to objects based on user-supplied input. It allows attackers to by...

Broken Access Control -> IDOR -> Access File

Broken Access Control: IDOR -> Access File Insecure Direct Object References (IDOR) occur when an application provides direct access to objects based on user-supplied input. It allows attackers...

Broken Access Control -> IDOR -> View Profile

Broken Access Control: IDOR -> View Profile Insecure Direct Object References (IDOR) occur when an application provides direct access to objects based on user-supplied input. It allows attacker...

Broken Access Control -> MFLAC

Broken Access Control: Missing Function Level Access Control (MFLAC) Missing function level authorization security vulnerability occurs when there are insufficient authorization checks for sensiti...

XXE - XML External Entity

XXE - XML External Entity XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entit...

Open Redirection

Open Redirection Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL w...