Articles

Post Title - wordpress plugin exposess 2023
photo

Threat hunters have discovered a rogue WordPress plugin that's capable of creating bogus administrator users and injecting malicious JavaScript code to steal credit card information.

Posted on - 2023-12-24

Post Title - MongoDB suffers security breach exposes customers data.
photo

MongoDB on Saturday disclosed it's actively investigating a security incident that has led to unauthorized access to "certain" corporate systems, resulting in the exposure of customer account metadata and contact information.

Posted on - 2023-12-18

profile

profile-pic

Abhijit Boro, CyberSecurity Enthusiast And RedTeamer / Self-Thought Programmer Skills with Web Development And More As Mentioned.

webvulns

xss ( cross-site-scripting )

photo_xss

Cross-Site-Scripting is script embeded in a page that are executed on the client side i.e. user browser rather than ate the server side. Cross-site scripting is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. Cross-site scripting carried out on websites accounted for roughly 84% of all security vulnerabilities documented by Symantec up until 2007



phishing

photo_phishing

Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.



sql injection

photo_sqlinjection

A SQL injection attack consists of insertion or “injection” of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to affect the execution of predefined SQL commands.



Meme

Wiki Search

find anyone's biography using wikipedia.

Admin

All Articles are posted By the Admin..

Languages

Python, PHP, MySQL, jQuery.

Certifications

TATA Cybersecurity Analyst, Simplilearn CEHv12, Tryhackme CompTIA Pentest+, Python programming.

CTF Player

Tryhackme 5% / hacker101 rooms.

dashboard

The hacker ethic is a philosophy and set of moral values within hacker culture.

attacks

xss, phishing, sqli, broken-auth, lfi, security misconfig.

Hash3sCracker_

It is really helpfull when you are doing web-penetration testing, it will crack your hash and identify your hashes.

Download Hash3sCracker_

Repository

ethic about

The hacker ethic is a philosophy and set of moral values within hacker culture.

Wikipedia

A wiki is a form of online hypertext publication, collaboratively edited and managed by its own audience, using a web browser.