Explain the process of bypassing authentication using SQL injection in the context of OWASP Juice Shop.
Saturday, 05 August 2023
by EITCA Academy
In the realm of web application security, one of the most prevalent and dangerous vulnerabilities is SQL injection. This technique allows attackers to bypass authentication mechanisms and gain unauthorized access to a web application's database. In this context, we will explore the process of bypassing authentication using SQL injection in the OWASP Juice Shop. OWASP
- Published in Cybersecurity, EITC/IS/WAPT Web Applications Penetration Testing, Web attacks practice, OWASP Juice Shop - SQL injection, Examination review
Tagged under:
Authentication Bypass, Cybersecurity, Juice Shop, OWASP, SQL Injection, Web Application Security
How was the vulnerability CVE-2018-71-60 related to authentication bypass and spoofing addressed in Node.js?
Saturday, 05 August 2023
by EITCA Academy
The vulnerability CVE-2018-7160 in Node.js was related to authentication bypass and spoofing, and it was addressed through a series of measures aimed at improving the security of Node.js applications. In order to understand how this vulnerability was addressed, it is important to first comprehend the nature of the vulnerability itself. CVE-2018-7160 was a vulnerability that
- Published in Cybersecurity, EITC/IS/WASF Web Applications Security Fundamentals, Managing web security, Managing security concerns in Node.js project, Examination review
Tagged under:
Authentication Bypass, Cybersecurity, Node.js, Security Advisory, Spoofing, Vulnerability

