cybersecurityDoc
cybersecurityDoc
OWASP is the open web application security project organization focused on improving the security
of software
OWASP has the top 10 vulnerabilities .In every three years Owasp organization conducts the world
wide meeting and find the most famous vulnerabilities.
The one user can login with their credentials then access and modify the another user’s
data.
Cryptographic Failures :
Injection :
Attacker send the malicious data as part of a command. When we know the username then
we can apply EX : [email protected]’--
Insecure design :
Security Miscofiguration :
These misconfigurations can occur at any level of an application stack, including the web
server, database, platform, frameworks, or application itself.
that occur when an application fails to protect against unauthorized alterations of its
software or data. This could happen during the development, deployment, or runtime of an
application. If an attacker can alter the software or data without detection, it can lead to serious
security breaches, including the introduction of malicious code or the corruption of important data.
Your logging system is set up, but it only logs basic information like successful logins and
completed transactions. It doesn’t log failed login attempts, changes to user profiles, or suspicious
activity like unusually large purchases.
Burp suite
Burp suite is the powerful software testing tool. surface to finding and exploiting security
vulnerabilities.
Proxy :- The proxy is the responsible between browser and target application.
Intruder: A powerful tool for automating customized attacks, such as fuzzing or brute-forcing
credentials.