are an important part of our lives. These days if one has any problem,one can look it up on the internet. But what if the Google or Bing it unavailable. If you haven't thought about it before, Google went down for an hour (in early 2021).
People were unable to access the services that google provided , be it drive,email, cloud computing ,etc.People were locked out of their own houses as they were using Google Powered IoT devices for their lock systems.
If you think that your website is safe, then think again. Study the following topics and check it out for yourself.
If you want to be a penetration tester,then Web Site Pentesting is not going to leave you anytime soon.
Learn About the 5 stages of Hacking.
Introduction to Local File Inclusion Vulnerability.
Introduction to Java Serialzation and Deserialzation.
It is a compact and self-contained way for securely transmitting information between parties as a JSON object.
Learn how leaving some sensitive information hard-coded can leave you vulnerable.
Learn how an attacker can use this Vulnerability to execute malicious commands.
Even if results aren't being fetched to us, doesn't mean the site isn't vulnerable.
Similar to Command Injection, but here we are restriced by a particlur language interpreter.
XSS allows malicious actors to inject malicious javascript code to the web applications.