Comprehensive List of Website Hacking Types (100+) sourced from ChatGPT SQL Injection Blind SQL Injection Boolean-Based SQL Injection Time-Based SQL Injection Error-Based SQL Injection Cross-Site Scripting (XSS) Reflected XSS Stored XSS DOM-Based XSS Cross-Site Request Forgery (CSRF) Clickjacking Remote File Inclusion (RFI) Local File Inclusion (LFI) Directory Traversal Session Hijacking DNS Spoofing Man-in-the-Middle (MITM) Attack…… Continue reading List of hacking types you should be protecting your website / portal against – Part 1
Month: January 2025
List of vulnerability databases
Vulnerability databases are used by variety of companies / entities to solidify their defenses in cyber world. Here is a list of vulnerability databases in prime use by various entities that I could find. https://nvd.nist.gov/ https://www.exploit-db.com/ https://msrc.microsoft.com/ https://ubuntu.com/security/notices https://github.com/advisories https://vulners.com/ https://owasp.org/ https://www.kb.cert.org/vuls/ https://www.cisa.gov/ https://www.cisa.gov/topics/industrial-control-systems https://security.snyk.io/ https://access.redhat.com/security/ https://cve.mitre.org/ Email me: Neil@HarwaniSytems.in Website: www.HarwaniSystems.in Blog: www.TechAndTrain.com/blog LinkedIn:…… Continue reading List of vulnerability databases
Information Technology Security Ecosystem – Part 1
While having a discussion, I thought of writing a blog covering all important layers of Information Technology Security ecosystem with some relevant links – so here it goes. Here are some important layers for the same: Physical security Hardware security Network security Endpoint security Application security Data security Identity and access management security Cloud /…… Continue reading Information Technology Security Ecosystem – Part 1