Skip to content
  • InfoSec Training
  • Bugbounty Tools
  • Exploiting Tools
  • Andorid Hacking
  • Wireless Hacking
  • facebook
  • Linkedin
  • Twitter
Menu
Secnhack

Security and Hacking Blog

  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Sunday, May 4, 2025

Tag: Vulnerability

OpenRedireX – A Open Redirection Vulnerability Finder

Shubham Goyal15 September 202022 October 2020
Bugbounty Tools / Exploiting Tools

Hey Folks, in this tutorial we are going to talk about an open source “Open Redirection” vulnerability finder tool called “OpenRedireX“. Simply tool takes the URL from the user and then it constantly tries to find open redirect issues using its own wordlist that called as “FUZZING“. If you want […]

Continue Reading

Open Redirection Vulnerability – Exploiting and Mitigation

Shubham Goyal9 September 20208 October 2020
Web Penetration Testing

Hey Folks, in this tutorial we are going to talk about another web application vulnerability called “Open Redirection“. Open Redirect also known as “Unvalidated Redirects and Forwards” that allow an attacker to redirect victims from the current page to a new URL or web page, which is not the victim’s […]

Continue Reading

Cross-Site Scripting : Vulnerability, Attacks and Mitigations

Shubham Goyal3 September 20203 September 2020
Web Penetration Testing

Hey Folks, In this tutorial we are going to continue our web application penetration testing series and will talk about Cross Site Scripting (XSS) which is also known as the OWASP A7 vulnerability. In this tutorial we will give you complete guide about the (XSS) vulnerability such as. and much […]

Continue Reading

Broken Authentication & Session Management Vulnerability

Shubham Goyal24 August 202020 May 2021
Web Penetration Testing

Hey Folks, In this tutorial, we are going to discussing the types, mitigation and exploitation of Broken Authentication and Session Management vulnerabilities. We are usually discussing the OWASP TOP 10 web application vulnerability and of which this vulnerability comes second in the OWASP TOP 10. Both vulnerabilities are very important […]

Continue Reading

For Business and Promo Inquiries

Stylish Email Button

Join our Live Training Courses

Follow us

Search Form

Advertisement

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Advertisement

Search
Menu
  • Ethical Hacking
  • Web Penetration Testing
  • Bug Hunting Tips
  • CVE (POC)
Social profiles
  • facebook
  • Linkedin
  • Twitter
Close

Categories

  • Andorid Hacking
  • Bug Hunting Tips
  • Bugbounty Tools
  • CMS Installation
  • Ctf Challenges
  • CVE (POC)
  • Dictionary and Bruteforce
  • Ethical Hacking
  • Exploiting Tools
  • Footprinting
  • Information Gathering
  • OS installation
  • Others
  • Password Cracking
  • Persistence
  • Soical Engineering
  • Vulnerability Scanner
  • Web Penetration Testing
  • Window Hacking
  • Wireless Hacking

Follow us

Copyright All rights reserved Theme: Insights by Themeinwp
  • About us
  • Contact us
  • Disclaimer
  • Privacy Policy
  • Tips & Updates