PinnedHow I became a Pen-tester /Bug bounty HunterThis is why I am in CyBer SeCurity FieLds.I worked as a Web design and developer at first. In 2012, I departed for Singapore for my career…Dec 16, 2020Dec 16, 2020
Consequences of SQL injection attacksSQL injection attacks pose a serious security threat to organizations. A successful SQL injection attack can result in confidential data…Feb 17, 2021Feb 17, 2021
Important of web penetration testingWeb penetration testing is an important tool that is used by security professionals to test the integrity of web-facing cyber assets and…Feb 12, 2021Feb 12, 2021
Six important security concepts that should be considered during the web application development…Feb 12, 2021Feb 12, 2021
XSS Attack ConsequencesThe consequence of an XSS attack is the same regardless of whether it is stored or reflected (or DOM Based). The difference is in how the…Feb 12, 2021Feb 12, 2021
What can an XSS attacker do?Generally speaking, if an attacker manages to perform an XSS attack, he could be able to basically do one or more of the following:Feb 12, 2021Feb 12, 2021
How to Determine If You Are VulnerableXSS flaws can be difficult to identify and remove from a web application. The best way to find flaws is to perform a security review of…Feb 12, 2021Feb 12, 2021
What do We Need to Know to do bug bounty?This is all about sharing what I learn…Feb 12, 2021Feb 12, 2021