🧭 Introduction In this demonstration, we explore one of the most dangerous yet commonly found web vulnerabilities—Stored Cross-Site Scripting (XSS). Unlike its reflected counterpart, stored XSS involves injecting malicious scripts that are permanently stored on the...
Sandbox99 Chronicles
From My Sandbox to Yours — Practical IT Insights.
Level Up: Using sqlmap and ZAP for SQL Injection Testing in DVWA
🧨 Introduction In our previous blog post, we successfully demonstrated a classic SQL Injection attack against DVWA (Damn Vulnerable Web Application) using its interactive web interface under security level: low. That exercise helped us understand how vulnerable input...
Mastering Force Browse in Practice
Introduction In the intricate world of web application security, "force Browse" stands as a fundamental technique for uncovering hidden vulnerabilities. It's the art of systematically guessing or predicting URLs, directories, and files that might not be directly...
From Spidering to Force Browsing: Expanding Your Reconnaissance with OWASP ZAP
Introduction Web application security testing is a critical practice for identifying and mitigating vulnerabilities before they can be exploited. A fundamental step in this process is reconnaissance – gathering as much information as possible about the target...
Unmasking Your Web App: A Deep Dive into OWASP ZAP’s Spidering
Introduction Have you ever wondered if your web application has hidden corners or forgotten pathways that could be exploited? In the world of cybersecurity, understanding every inch of your application's surface is paramount. This is where web spidering comes into...
Unveiling Credentials: Brute-Forcing DVWA with OWASP ZAP
Introduction Welcome back, security enthusiasts! This marks the third installment in our series dedicated to the art and science of brute-force attacks. In our previous discussions, we've explored the fundamental principles of brute-forcing, and in our last blog, we...