OS COMMAND INJECTION

OS command injection

It also known as shell injection. It is a web security vulnerability that allows an attacker to run a compulsory os command on the server running the application. And generally compromises the application and all its data. Often, the attacker can make OS Command injection vulnerable to compromising with other parts of the hosting infrastructure. Which absorbs trust relations to attack other systems in the organization.

What is Web Cache Poisoning?

Web Caches recognizes resources using some special components of each HTTP request, known together as a cache key. Two requests with the same cache key are considered equivalent to the cache. Cache key usually includes request lines and host header, but any other headers.

Webcams cause poisoning weaknesses when the application behind the cache processes the input that is not included in the cache key. Attackers, who save cache and then serve other users, can use it by sending input that is created to trigger harmful responses.

What is Spoof Website?

Spoof websites are generally considered to be a form of phishing. Which is designed to make hacking or IT structures intended to steal information. Generally, a Spuff website will use a logo, impressive text. Read More

Leave a comment