Secure Code Review
Secure Code Review: Reading Code Through an Attacker’s Eyes in JavaScript and Node.js While a typical code review focuses on functional correctness and code quality, a Secure Code Review goes a st...
Secure Code Review: Reading Code Through an Attacker’s Eyes in JavaScript and Node.js While a typical code review focuses on functional correctness and code quality, a Secure Code Review goes a st...
HTTP Status Codes HTTP status codes are more than just numbers indicating success or failure; they are a critical source of intelligence for a penetration tester. Each code, especially within the ...
Browser Extension Security Browser Extensions are powerful tools that extend the functionality of web browsers and enhance the user experience. From ad blockers to productivity tools and developer...
Core JWT Vulnerability Analysis and Attack Scenarios The majority of successful JWT attacks begin with a single objective: bypassing the server’s signature verification logic. If the signature can...
1. Basic Concepts of SOAP Contrary to its name, SOAP (Simple Object Access Protocol) is not a simple protocol. It is platform and language independent, offering flexibility to operate over various...
When a file upload feature is present, you should check the following items. Fundamentally, from a developer’s perspective, a whitelist or allowlist approach is ideal. Checklist Check the...
Web Penetration Testing: Dissecting HTTP Headers When performing web penetration testing, HTTP headers are the backbone of communication between the client and server. They provide crucial clues f...
Differences Between Cookies and Sessions Cookies Cookies are small pieces of data stored in the client’s local storage in key-value pairs. They are primarily used in web applications to identify u...
2021 Top 10 Web Application Security Risks A1:Broken Access Control (was A5) Description Access control is a security mechanism that enforces policies to ensure users can only act within their i...
2017 Top 10 Web Application Security Risks A1:Injection Description Injection vulnerabilities, appearing in various forms like SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sen...