Latest Articles
Cluster Upgrade
A cluster consists of one master machine and several worker machines or nodes. Nodes are basically VMs that contain a suitable environment for services to run in it. Since the concept of containerization has widened up a lot in recent years, we can deploy multiple applications inside the same or different nodes using docker containers in the form of pods. The master coordinates between all the nodes.
Threat Analysis
The process of analyzing the cyber operations and capabilities of unknown intelligence institutions or criminals is known as cyber threat analysis. A cybersecurity threat, also known as a “cyber threat,” is a malicious act that attempts to disrupt digital life. This act may include the interruption of a communication channel, data destruction, or data theft.
What is IDOR and how to exploit it?
IDOR Stands for Insecure Direct Object Reference and it is a type Of Access Control Vulnerability. According to OWASP IDOR occurs when a program allows direct access to objects based on user data, this is known as an unreliable direct object reference. As a result of this flaw, attackers can circumvent authorization and gain direct access to device resources, such as database records and files.
What is HTML Injection?
It is a kind of attack in which HTML code is injected through the vulnerable parts of the website with the purpose to change the design or information, that is displayed to the user. As a result, the user may see the data or information that was sent by the malicious user.In simple terms, it can be used to deface a web page or redirect the user to a malicious website.
Using libraries like Angular, React and Vue
Angular is a platform and framework for building single-page client applications using HTML and TypeScript. It is a JavaScript open-source front-end web application framework.