How to implement Hybrid File Service in AzureIn this blog post, we’ll explore how to use Azure File Sync and Azure Files to extend file services hosting capabilities across cloud and…May 20, 2024May 20, 2024
Queue-Based Load Leveling pattern in cloud-hosted applicationsIn this blog post, we’ll explore the queue-based load leveling pattern, a crucial technique employed in cloud-hosted applications to…May 5, 2024May 5, 2024
Published inSystem WeaknessUNDERSTANDING OWASP TOP 10We have been talking about our website owner Jack and his miseries for a while now, and time and again, I have mentioned “OWASP top 10” in…Apr 25, 2022Apr 25, 2022
Published inSystem WeaknessClickjacking: Think twice before you click!You receive a link to a website that sells really cheap villas in Mexico. Who doesn’t want a cheap estate in Mehico? But what catches your…Apr 13, 20222Apr 13, 20222
Published inSystem WeaknessIntroduction to CSRF: Stepwise Guide to bypass CSRF Tokens (2/2)In the first part of this blog series, we talked about the CSRF attack and CSRF tokens. In an ideal world, CSRF tokens would be a great…Apr 4, 20222Apr 4, 20222
Published inSystem WeaknessIntroduction to CSRF: How can a cookie get you hacked? (1/2)“We use cookies to enhance your browsing experience, by clicking ACCEPT ALL you consent to our use of cookies”Mar 24, 20229Mar 24, 20229
Published inSystem WeaknessHow to exploit Directory traversal vulnerabilitiesDirectory Traversal Attack is one of the most popular attacks among hackers. As a part of the “Broken Access Control” vulnerability, it…Mar 14, 20222Mar 14, 20222