Va Aswatson
Va Aswatson
1.SQL INJECTION:
Usage -Temp: mail= [email protected]
Password= administrator’—
How it works
An attacker can inject SQL control characters and command keywords into an
application's input field, which is then used to query the database.
what it can impact
SQL injection can lead to the unauthorized viewing of user lists, the deletion of
tables, and the loss of customer trust.
Results,
This website has no SQL vulnerability
3.CLIENT-SIDE VALIDATION:
Client-side validation refers to the process of verifying user input in a
web application on the user's device (usually within their browser)
before the data is submitted to the server.
- Static client-side
- Dynamic client-side
Client-side validation is the process of checking the user input on the
web browser before sending it to the server. It can improve the user
experience, reduce the network traffic, and prevent some common
attacks
• IMPACT: client-side validation is not secure, as it can be easily
bypassed, modified, or disabled by malicious users or hackers.
• SOLUTION: setting the values of Client Validation Enabled &
Unobtrusive JavaScript Enabled keys to true or false.
STATIC CLIENT-SIDE:
Static client-side validation refers to the use of predefined, built-in
mechanisms for validating user inputs in a web form without the need
for dynamic or script-based logic (such as JavaScript).
6.HIJACKING:
It's a form of attack where a bad actor steals or manipulates the
session token to gain unauthorized access to information or services.
7.USER ENUMURATION:
Allows an attacker to determine whether a user exists in a particular application.
• IMPACT: Techniques with the purpose of finding valid login credentials such
as usernames.
• SOLUTION: To mitigate this, change the error message to “Incorrect login or
password,” making it impossible for the attacker to infer the existence of a user
in the application.
Fig: login register email in register page
Results,
This website has no weak password policy vulnerability..