OWASP Top 10–2021 Tryhackme Writeup

Learn about OWASP's Top 10 – 2021 web security flaws findings

Mukilan Baskaran
3 min readJust now

Hello fellow hackers and Infosec guys today I’m going to share OWASP's top 10 TryHackme

free link : link

Certainly! While Insecure Design and Injection might seem similar, they are distinct types of vulnerabilities. Let’s break them down:

Insecure Design

  • Definition: Insecure Design refers to flaws in the design phase of software development that result in security weaknesses. It’s about the overall architecture and planning of the application.
  • Focus: The emphasis is on the design process, ensuring that security principles are integrated from the beginning.

Examples:

  • Lack of input validation design.
  • Insufficient authentication or access control mechanisms planned.
  • Absence of secure development lifecycle practices.

Injection

  • Definition: Injection involves an attacker sending untrusted data (such as SQL, NoSQL, OS…

--

--