Posts

Showing posts from September, 2023
Image
  Web-App Vulnerability: 1. Denial-of-Service (DOS) Attack via Long Password 2. Cross-Site Scripting (XSS) 3. Client-Side Validation Bypass 4. Open Directory Vulnerability 5. Insecure Direct Object Reference (IDOR) 1.Denial-of-Service (DoS) Attack via Long Password:  A Denial-of-Service (DoS) attack via a long password is a cyberattack aimed at disrupting a service's availability by submitting an exceptionally long or resource-intensive password during the authentication process. The attack unfolds as follows: Authentication : In typical systems, users provide a username and password for authentication. Long Password : Attackers use an abnormally long or resource-intensive password during authentication. Resource Strain : Processing this input consumes excessive server resources (CPU, memory), causing the system to become unresponsive or crash. Service Denial : Legitimate users are unable to access the service due to resource exhaustion, resulting in a denial of service. To de...
Image
  VULNERABILITY: A vulnerability is a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system. After exploiting a vulnerability, a  cyberattack  can run malicious code, install  malware , and even steal  sensitive data . COMMON VULNERABILITY: 1. Brute Force attacks 2. CSRF vulnerability 3. Clickjacking Vulnerability 4. Long Password DoS Attack 5. Client-Side Validation Bypass Vulnerability 6. SQL Injection 7. Broken Authentication 8. Rate Limit issues 9. XSS 10. Broken Access Control 1.B rute For ce Attacks: Brute force attacks involve systematically trying every possible combination of usernames and passwords until the correct credentials are found. For instance, an attacker may use automated tools to repeatedly attempt to log in to an online account, such as email or banking, by trying various username and password combinations. This method is time-consuming but can be effective, especially if users have weak or easily...