Tutorials
Courses
Data Structure
Java
Python
HTML
Interview Preparation
DSA
Practice Problems
C
C++
Java
Python
JavaScript
Data Science
Machine Learning
Courses
Linux
DevOps
SQL
Web Development
System Design
Aptitude
GfG Premium
Similar Topics
Web Technologies
37.4K+ articles
Python
21.3K+ articles
Misc
8.7K+ articles
C++
4.3K+ articles
GBlog
3.3K+ articles
C Language
1.8K+ articles
Computer Subject
1.1K+ articles
Ethical Hacking
753+ articles
cryptography
189+ articles
vulnerability
15+ articles
secure-coding
25 posts
Recent Articles
Popular Articles
Command Injection Vulnerability and Mitigation
Last Updated: 14 June 2022
Command injection is basically injection of operating system commands to be executed through a web-app. The purpose of the command injection attack is to inject and execut...
read more
C Language
secure-coding
vulnerability
Path Traversal Attack and Prevention
Last Updated: 29 September 2022
A path traversal attack allows attackers to access directories that they should not be accessing, like config files or any other files/directories that may contains server...
read more
PHP
secure-coding
What is Session Hijacking?
Last Updated: 28 May 2025
Session hijacking is a security attack on a user session over a protected network. The most common method of session hijacking is called IP spoofing, when an attacker uses...
read more
Ethical Hacking
secure-coding
How slow HTTP can knock down a server
Last Updated: 01 May 2025
Slow HTTP are application layer Denial Of Service (DoS) attack and has the potential to knock down a server with limited resources. Because of the nature of the attack (sl...
read more
GBlog
Computer Subject
secure-coding
Automated Brute Forcing on web-based login
Last Updated: 29 September 2022
Brute force attacks work by calculating every possible combination that could make up a password and testing it to see if it is the correct password. As the password’s len...
read more
Ethical Hacking
secure-coding
What is WannaCry and How does WannaCry ransomware works
Last Updated: 04 June 2025
In May 2017, a massive cyberattack shook the world when the WannaCry ransomware outbreak spread rapidly across hundreds of thousands of computers in more than 150 countrie...
read more
GBlog
secure-coding
hmac - Keyed-Hashing for Message Authentication
Last Updated: 20 July 2017
HMAC is a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative cryptographic hash function, e.g., MD5, SHA-1, in co...
read more
Misc
Python
secure-coding
cryptography
"use strict" in JavaScript
Last Updated: 03 December 2024
In JavaScript, "use strict" is a directive that enables strict mode, which was first introduced in ECMAScript 5 (ES5) to assist in the writing of safer and more error-free...
read more
JavaScript
Web Technologies
secure-coding
javascript-basics
Meltdown Security Vulnerability
Last Updated: 29 September 2022
What is Meltdown security vulnerability?Meltdown, also known as Rogue Data Cache Load, is a security vulnerability that affects microprocessors of the types Intel x86, IBM...
read more
Misc
Ethical Hacking
system-programming
secure-coding
vulnerability
Format String Vulnerability and Prevention with Example
Last Updated: 07 March 2024
A format string is an ASCII string that contains text and format parameters. Example:// A statement with format stringprintf("my name is : %s\n", "Akash");// Output// My ...
read more
Computer Subject
C Language
secure-coding
vulnerability
Code Injection and Mitigation with Example
Last Updated: 29 September 2022
Code injection is the malicious injection or introduction of code into an application. The code introduced or injected is capable of compromising database integrity and/or...
read more
Ethical Hacking
secure-coding
Passwords and Cryptographic hash function
Last Updated: 29 September 2022
We have introduced and discussed importance of hashed passwords. To create strong hashed passwords, we must understand some terminology related to it and then we will see ...
read more
Ethical Hacking
secure-coding
cryptography
Vulnerability in input() function – Python 2.x
Last Updated: 29 March 2024
This article aims to explain and explore the vulnerability in the input() function in Python 2.x. In Python 3, the raw_input() function was erased, and its functionality w...
read more
Python
secure-coding
vulnerability
Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries)
Last Updated: 20 August 2024
SQL injection is one of the most common and dangerous vulnerabilities that can affect a database-driven application. Attackers can exploit these vulnerabilities by injecti...
read more
Computer Subject
SQL
secure-coding
sql-injection
Databases
Best Practices for Secure Coding in Web Applications
Last Updated: 02 April 2024
Web applications are essential for corporations to deliver digital offerings, and they have got grow to be increasingly important in recent years as increasingly human bei...
read more
secure-coding
vulnerability
Cyber-security
Ethical Hacking - Hacking Web Applications
Websites & Apps
Web Security
1
2
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our
Cookie Policy
&
Privacy Policy
Got It !