Posts

How our course help you to land in foreign studies?

Image
Why Choose Our Course? 1. Our Diploma is Authorised by the Indian Government as well as its full copyright & Trademark by ISO. IT will help you to add Extra Technical Skills in Your Resume. Its Contains Full Practicals Knowledge from the Industry Point of View.                                                  & Many more... 2. Placements? In Our Diploma, 100% Placement is given to the students who had done along with their graduation. 3. Package? The package will be between 2LPA to 4LPA for Freshers, Depending upon their Academic qualifications also. 4. Internship? The internship is given so that you are able to work in IT Industry and feel as usual the things that are given in our Diplomas, Our Internship Letter is Confirmed by the Company with a small amount of Stipend. 5. Education Loan? For Our Diploma, you will get a 90% Education loan with 0% ROI...

No Rate Limiting on Forgot Password

Image
Introduction to No Rate Limit ? A "no rate limiting" vulnerability refers to a security weakness in a system or application where rate limiting controls are not properly implemented or absent altogether. Rate limiting is a technique used to restrict the number of requests or actions that can be performed within a given timeframe. It is commonly employed to protect against various types of attacks, such as brute force attacks, denial-of-service (DoS) attacks, and other forms of abuse. Without rate limiting, attackers have the freedom to perform actions at an unlimited rate, which can lead to severe consequences for the targeted system or application. The lack of restrictions on request rates allows malicious actors to bypass authentication mechanisms, guess passwords, or exhaust server resources, ultimately compromising the security and availability of the system. When a system lacks proper rate limiting mechanisms, it becomes vulnerable to exploitation. Attackers can potentia...

XMLRPC Attack leads to SSRF (SSRF via XMLRPC)

Image
In this Article  ? What is XMLRPC Attack ? What is SSRF Attack ? SSRF via XMLRPC  How to Perform SSRF via XMLRPC ?  Reporting Impact Mitigation What is XMLRPC Attack ? XML-RPC is a simple and widely supported protocol that has been used in various applications, such as web services, blogging platforms, content management systems, and remote administration of software systems. It provides a standardized way for different software components to interact and exchange data in a cross-platform manner. If an XML-RPC implementation is vulnerable to remote code execution, an attacker can send specially crafted XML-RPC requests to execute arbitrary code on the server. This can lead to unauthorized access, data breaches, or further exploitation of the system. What is SSRF Attack ? A Server-Side Request Forgery (SSRF) attack is a type of security vulnerability that occurs when an attacker is able to manipulate a web application into making unintended requests to internal or external...

Active Directory hacking

Image
  Active Directory hacking refers to the unauthorized access and exploitation of the Active Directory (AD) infrastructure, which is a centralized database that stores and manages information about network resources in a Windows domain. Active Directory is widely used in organizations to manage user accounts, groups, permissions, and other network resources. The purposes behind Active Directory hacking can vary, but typically include gaining unauthorized access to sensitive data, compromising user accounts, escalating privileges, and potentially causing disruptions to the network infrastructure. Here are some common uses and techniques employed by attackers in Active Directory hacking: Privilege Escalation: Once inside the network, attackers attempt to escalate their privileges by exploiting vulnerabilities or misconfigurations in the Active Directory infrastructure. This allows them to gain administrative access to critical systems and control over other user accounts. Password Att...

EXIF Geolocation Data Not Stripped From Uploaded Images

Image
EXIF Geolocation Data Not Stripped From Uploaded Images (Manual User Enumeration) EXIF (Exchangeable Image File Format) is a standard used to store metadata within image files. This metadata includes information such as camera settings, date and time of capture, and even geolocation data. Geolocation data, also known as geotags or geotagging, refers to the specific latitude and longitude coordinates where the image was taken. In some cases, when you upload an image to a website or social media platform, the geolocation data embedded in the image's EXIF metadata is not automatically stripped or removed. This means that anyone who has access to the image can potentially extract the geolocation information and determine the exact location where the photo was taken. In this Article : Manual User Enumeration Introduction  Manual User Enumeration Finding & Reporting What is Impact What is Mitigations Let’s start to details of a Manual User Enumeration vulnerability. We are going to a...

Stored XSS Vulnerability

Image
Complete Guidance of Store XSS (Finding & Reporting)  Let’s start to understand the details of a stored cross-site scripting vulnerability. We are going to hear about the basic description of the vulnerability and how to search for it. Introduction to Stored XSS ?   Stored XSS, also known as persistent XSS or type I XSS, is a web application vulnerability that allows an attacker to inject malicious code into a website that is permanently stored and displayed to other users. It is one of the most common types of cross-site scripting (XSS) attacks. The consequences of stored XSS can be severe. When a user visits a page that serves the stored malicious script, the script can execute arbitrary code in their browser, potentially allowing an attacker to steal sensitive information, manipulate th e content of the website, perform actions on behalf of the user, or even distribute malware. In this Article :  How to Find stored XSS Vulnerability  Stored XSS Mitigation ...