Application SecurityTechnology

Understanding the CSRF(Cross-site request forgery) Vulnerability

The basic principle of CSRF vulnerability Whenever we are accessing an application, the browser is sending a request to the server and the server responds to the request by sending some data to the browser called response. This two-way communication continues as we continue using the application. When we login to the application, the login […]

Ankit Giri
Ankit Giri
Read

Application SecurityAWSTechnology

Why compromised Jenkins can lead to a disaster?

I was recently searching for something on Google and came across this instance of what might be a logical vulnerability prevailing across multiple web applications. I was searching for publicly accessible Jenkins console through Google Dorking. My search query listed some of the websites that had Jenkins as a part of their domain name. Although this itself […]

Ankit Giri
Ankit Giri
Read