Davinder Tutorials
This blog is all about Cyber Security and IT
Toggle navigation
Davinder Pal Singh
Guest Posting
About Us
Subscribe To
Posts
Atom
Posts
All Comments
Atom
All Comments
No posts with label
integrity
.
Show all posts
No posts with label
integrity
.
Show all posts
Home
Subscribe to:
Posts (Atom)
Vulnerabilities
Application level DoS via 2- Factor Autentication
Application level DoS via xmlrpc.php
Pixel Flood Attack leads to Application level DoS
Buffer Overflow
No Restriction on Password length
No Rate Limit Bug on Forgot password
Open URL Redirection
Reflected XSS
Cache Poisoned Denial of Service Simplified
XSS found using host header injection
Password Reset link hijacking via Host Header Pois...
HTTP Cache Poisoning via Host Header Injection
Host Header Attack
SPF Vulnerability
CORS[ Cross-Origin Resource Sharing]
Session Fixation Via Cookie Value
Race Condition Bug
2FA Bypass Techniques
Regular Expression Denial of Service
State Parameter Mising Bug- OAuth Misconfiguration
About Me
Hack The Box Rank
Try Hack Me Rank
Popular Posts
What I can do during graduation to get into Cyber Security?
Some students who want to go in cyber security don't know which certifications or skills they can do while doing their graduation. So In...
How to check mongo db public availability without authentication?
MongoDB is a popular NoSQL database used by many organizations around the world. It is known for its flexibility and scalability, making it ...
Reflected XSS - Explained with a real world example
OVERVIEW OF THE VULNERABILITY: Reflected cross-site scripting (or XSS) arises when an application receives data in an HTTP request and in...
Code Review Methods - Bug Hunting
We can find lot of web application level vulnerabilities by reviewing the code. Below are some of the steps that can help you discover these...
Open URL Redirection Vulnerability- Well Explained
Overview: What are Redirects? Redirect means allowing a website to forward the request for the resources to another URL/endpoint. Let’...
E-mail MFA mode allows bypassing MFA from victim’s device when the device trust is not expired
While reading challenges to bypass 2FA , I came to see how l1nkworld submitted a report to Grammarly. Aug 2nd ( 2 years ago ) Summary: I...
How to get Entry Level Job in Cyber Security
This video is for all those students who want to get a Job in Cyber Security feild but don't know from where to start. So tried to exp...
What is an SSRF?
SSRF stands for Server-Side Request Forgery. It's a vulnerability that allows a malicious user to cause the webserver to make an addit...
Carriage Return and Line Feed (CRLF) Injection
Carriage Return and Line Feed (CRLF) Injection is a type of injection attack that targets web applications. This type of attack is also know...
Top Github Dorks- 2022 Bug Bounty
Below are list of popular dorks bug hunters use for hunting bugs api_key “api keys” authorization_bearer: oauth auth authentication client_s...