Shubhangi VashistQueue-Based Load Leveling pattern in cloud-hosted applicationsIn this blog post, we’ll explore the queue-based load leveling pattern, a crucial technique employed in cloud-hosted applications to…3 min read·May 5, 2024----
Shubhangi VashistinSystem WeaknessUNDERSTANDING OWASP TOP 10We have been talking about our website owner Jack and his miseries for a while now, and time and again, I have mentioned “OWASP top 10” in…7 min read·Apr 25, 2022----
Shubhangi VashistinSystem WeaknessClickjacking: Think twice before you click!You receive a link to a website that sells really cheap villas in Mexico. Who doesn’t want a cheap estate in Mehico? But what catches your…3 min read·Apr 13, 2022--2--2
Shubhangi VashistinSystem WeaknessIntroduction to CSRF: Stepwise Guide to bypass CSRF Tokens (2/2)In the first part of this blog series, we talked about the CSRF attack and CSRF tokens. In an ideal world, CSRF tokens would be a great…5 min read·Apr 4, 2022--2--2
Shubhangi VashistinSystem WeaknessIntroduction to CSRF: How can a cookie get you hacked? (1/2)“We use cookies to enhance your browsing experience, by clicking ACCEPT ALL you consent to our use of cookies”4 min read·Mar 24, 2022--9--9
Shubhangi VashistinSystem WeaknessHow to exploit Directory traversal vulnerabilitiesDirectory Traversal Attack is one of the most popular attacks among hackers. As a part of the “Broken Access Control” vulnerability, it…6 min read·Mar 14, 2022--2--2