XML Injection Attack review

In this post, I would like to share about XML Injection Attack that might be useful for some scenarios. For those who are not familiar with XML Injection attack, XML […]

Cross-origin resource sharing Review

Cross-origin resource sharing can be considered as one of the attacks that the website application server vulnerabilities. Normally, it will enable any controlled access to the bug located where it […]

SQL Injection Masterclass

In this post, I would like to take some time to talk on the well-known attack to all people out there. The attack that I mentioned above is SQLi which […]

Shodan CLI

Mostly everyone in Security Field will know “Shodan” which its the world’s first search engine on the Internet-connected related. Lately, I found a new method for the Shodan Usage which […]

Buffer Overflow Masterclass

For starter, Buffer Overflow only occurs when the program has attempted to write more data into the fixed block of memory. The attacker will send crafted data to the memory […]