URL Tampering

URL tampering involves altering the query parameters in a URL to: Bypass security checks Access unauthorized data Exploit vulnerabilities in the application For instance, by modifying parameters like script, deploy, compid, ns-at, and internalid in the URL, you can test how the application validates these inputs and whether it enforces security policies like authentication and… Continue reading URL Tampering

Security Testing using Selenium Automation

Using ZAP (Zed Attack Proxy) Steps: Download the Installer: link Install It and Open the Application Add Dependency in Selenium (POM.XML) Check the local host: Add the specific Key to the script: (How to open the API_KEY: Open ZAP → Tools → Options → API → API Key.) Add the specifics to the scripts and… Continue reading Security Testing using Selenium Automation

Penetration Testing

It is a form of cyberattack done to understand the situation of the security of the system. People often confuse this test with the vulnerability assessment test. So penetration test is composed of some methods or instructions whose main aim is to test the organization’s security. This test proved to be helpful for organizations because… Continue reading Penetration Testing