Select Page

Author: vinay panchal

What is Cross Site Request Forgery (CSRF) Vulnerability Attack?

Hi guys!! Today we will talk about one of the trending vulnerability cross site request forgery attack. Below I have divided this topic in number of parts to get better perceptive. Agenda:- Introduction Consequences Exploitation Mitigation 1. Introduction: What is cross site request forgery attack? Cross site request forgery is also known as XSRF, “Sea Surf”, and Session Riding. Cross site request forgery is a attack which comes under top 10 of OWASP (i.e Open Web Application Security Project) vulnerability and it is a common possible exploited vulnerability type. Approximately 24% of the web application is vulnerable to this...

Read More


What is DNS and How it’s Work ? DNS stands for Domain Name System. DNS is like internet phone-book. Humans identify things people places by names whereas computers only know numbers. Each and every URL you type for example, you are first directed to the DNS server which searches for the correct Ip address of the url or domain name that you have typed. Usually your ISP provides the DNS servers, thereby monitoring your activity on web. The process is complex so all you need to know is that DNS server is like a phone-book you search for...

Read More

The Deep Web, The Dark Web and Tor

We often hear the terms Deep Web, Dark Web and Tor. Sometimes, we even use the terms Deep Web and Dark Web interchangeably. But, are they same or are hey different ? And, how does Tor work ? Let’s try to understand this. Deep Web :- Deep Web is a part of the World Wide Web which are not indexed by standard search engines. So, one cannot browse those pages normally. For example, one can login to social networking sites by giving his username and passwords and then change the profile settings in such a way that only a...

Read More

What is a Zero-day Threat ?

A zero-day threat is a threat that exploits an unknown security vulnerability, even before the developers of the software are aware of it. It uses the unknown vulnerability in the software and creates complicated problems of data theft and identity theft. The threat is known as “zero-day” because once the flaw is discovered, the developers get zero-day to plan and advise mitigation against the threat. Zero-day exploits are often put up by renowned hacker groups. Typically, the zero-day attack exploits a bug that neither developers, nor the users, know about. Indeed, this is exactly what the malicious coders anticipate....

Read More

What Are Phishing Scams And How To Protect Yourself ?

What is phishing scam ? According to the,  phishing is a  “practice of sending emails that appear to be from a reputable source but with the goal of gaining your personal information,banking information, credit card details, and passwords.” The most common examples of phishing mails are “You won  iPhones, register now to select what color iPhone you want” or  “Urgent: You are entitled to a Tax Refund”. How To Protect Yourself ? Check the URL before clicking on a link:- If you have even a little doubt about the safety of the email then don’t click on any of those links — even if they...

Read More

Sign up for premium Hacking Tutorials


Your ad can be here. Contact us: [email protected]


For more Premium Tutorials LIke