Skip to content
Thursday, June 19, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

web-site

Tutorial Web Hosting Website 

Finding SQL Injection Bugs

May 6, 2020 Krishna DELETE Statements, Finding SQL Injection Bugs, Injecting Code, Injecting into Different Statement Types, INSERT Statements, Numeric Data, SELECT Statements, SQL, SQL statements, String Data, web-app, web-app-hack, web-hack, web-site

In the most obvious cases, a SQL injection flaw may be discovered and conclusively verified by supplying a single item

Read more
Tutorial Web Hosting Website 

Injecting into SQL

May 6, 2020May 6, 2020 Krishna Bypassing a Login, Exploiting a Basic Vulnerability, http, Injecting Code, Injecting into SQL, Linux, PHP, SQL injection, web, web hacking, web-app, web-app-hack, web-site

Almost every web application employs a database to store the various kinds of information that it needs in order to

Read more
Tutorial Web Hosting Website 

Injecting Code

May 5, 2020 Krishna attacker, code injection, command shell, HACKING, Injecting Code, Injecting into Interpreted Languages, interpreted language, ldap, Perl, PHP, shell scripting environment, SQL, VULNERABILITIES, vulnerable script, web application, web hacking, web-app, web-site

The topic of code injection is a huge one, encompassing dozens of different languages and environments, and a wide variety

Read more
Tutorial Web Hosting Website 

A Multi-Layered Privilege Model

May 5, 2020 Krishna A Multi-Layered Privilege Model, Attacking Access Controls, Declarative control, Discretionary access control, HACKING, Programmatic control, Role-based access control, web-app, web-app-hacking, web-site, web-site hacking

Issues relating to access apply not only to the web application itself but also to the other infrastructure tiers which

Read more
Tutorial Web Hosting Website 

Attacking Access Controls

May 5, 2020 Krishna Attacking Access Controls, web-app, web-app-hacking, web-hack, web-site

Before starting to probe the application to detect any actual access control vulnerabilities, you should take a moment to review

Read more
Tutorial Web Hosting Website 

Attacking Access Controls

May 5, 2020 Krishna Attacking Access Controls, Completely Unprotected Functionality, ETHICAL HACKING, hack, Identifier-Based Functions, Insecure Access Control Methods, Multistage Functions, Static Files, web-app, web-app-hacking, web-site

Common Vulnerabilities Access controls can be divided into two broad categories: vertical and horizontal. Vertical access controls allow different types

Read more
Tutorial Web Hosting Website 

Log, Monitor, and Alert

May 5, 2020May 5, 2020 Krishna 'monitor', and Alert, application’s session, Attacking Session Management, HACKING, log, Reactive Session Termination, web-app-hacking, web-site

The application’s session management functionality should be closely integrated with its mechanisms for logging, monitoring, and alerting, in order to

Read more
Uncategorized 

Securing Session Management

May 5, 2020 Krishna Attacking Session Management, ETHICAL HACKING, Generate Strong Tokens, HACKING, Per-Page Tokens, Protect Tokens throughout Their Lifecycle, Securing Session Management, web-app, web-site, wep-app-hacking

The defensive measures that web applications must take to prevent attacks on their session management mechanisms correspond to the two

Read more
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.