Real time CSRF exploitation

Introduction This document will guide you to exploit the CSRF (Cross Site Request Forgery) vulnerability step by step wherein an attacker can launch the CSRF attack against the valid application user and update the details. It will also give an idea to mitigate these risks under the recommendations section. Since this was a real-time attack […]

Read more "Real time CSRF exploitation"

HowTo DVWA on Kali

Intro Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security […]

Read more "HowTo DVWA on Kali"