OWASP Top Ten Hindi 2023

  •                        TOP !0

    OWASP Top Ten ek list hai jo web application security ke
    • 10 sabse bade risks ko dikhata hai......

    • OWASP Top Ten me wo 10 sabse bade risks hai jo web applications ko vulnerable 
    • bana sakte hai. Is list ko samajhne se developers ko ye pata chalta hai ki wo kis
    • tarah se apni applications ko secure kar sakte hai.
    1. Injection: Ye vulnerability hoti hai jab attackers web application me malicious code
    inject karte hai. Is tarah se wo sensitive data ko bhi access kar sakte hai. 2. Broken Authentication and Session Management: Ye vulnerability hoti hai jab web application authentication or session management ko sahi se handle nahi karta hai. Is
    tarah se attackers ko user accounts ko access karne ke liye exploit karne ka mauka mil
    jata hai. 3. Cross-Site Scripting (XSS): Ye vulnerability hoti hai jab attackers web application me malicious javascript code inject karte hai. Is tarah se wo sensitive data ko bhi access kar
    sakte hai. 4. Insecure Direct Object References: Ye vulnerability hoti hai jab web application me
    user ko access dene ke liye IDs ka istemal kiya jata hai. Is tarah se attackers ko access
    mil jata hai jo unhe nahi milna chahiye. 5. Security Misconfiguration: Ye vulnerability hoti hai jab web application ka configuration
    sahi se nahi kiya jata hai. Is tarah se attackers ko access mil jata hai jo unhe nahi milna
    chahiye. 6. Sensitive Data Exposure: Ye vulnerability hoti hai jab web application me sensitive
    data ko protect nahi kiya jata hai. Is tarah se attackers ko sensitive data ka access
    mil jata hai. 7. Insufficient Attack Protection: Ye vulnerability hoti hai jab web application me
    sufficient security measures nahi hai. Is tarah se attackers ko web application ko
    hack karne ke liye exploit karne ka mauka mil jata hai. 8. Cross-Site Request Forgery (CSRF): Ye vulnerability hoti hai jab attackers web
    application ke through user ko kisi bhi action ko perform karne ke liye force karte hai.
    Is tarah se attackers ko user accounts ko access karne ke liye exploit karne ka
    mauka mil jata hai. 9. Using Components with Known Vulnerabilities: Ye vulnerability hoti hai jab web
    application me third-party components ka use kiya jata hai jo vulnerabilities ke sath
    aata hai. Is tarah se attackers ko web application ko hack karne ke liye exploit karne
    ka mauka mil jata hai. 10. Insufficient Logging and Monitoring: Ye vulnerability hoti hai jab web application
    me sufficient logging and monitoring nahi hai. Is tarah se attackers ko web application
    ko hack karne ke liye exploit karne