Blind OS command injection with time delaysLab(2): Blind OS command injection with time delaysLab Description →Oct 30, 2023Oct 30, 2023
Lab(1)OS command injection, simple caseLab(1): OS command injection, simple caseOct 30, 2023Oct 30, 2023
Access control vulnerabilities and privilege escalationAccess control vulnerabilities and…Access control is method by which a constraint is put on users of web application that if they can do a specific activity or not , or they…Oct 29, 2023Oct 29, 2023
Authentication : 2FA bypass using a brute-force attackLab Description : This lab’s two-factor authentication is vulnerable to brute-forcing. You have already obtained a valid username and…Oct 27, 2023Oct 27, 2023
Cross Site Request ForgeryCSRF is a type of attack in which victims do some malicious task on a victim authenticated web application on behalf of the attacker’s…Oct 27, 2023Oct 27, 2023
Server-side request forgery (SSRF) (PortswiggerServer-side request forgery (SSRF)Oct 26, 2023Oct 26, 2023
OAuth 2.0 authentication vulnerabilities()OAuth 2.0 authentication vulnerabilitiesOct 26, 2023Oct 26, 2023