Application security

Passive Fingerprinting

During penetration testing, the main objective of the auditor is to exploit and gain access. For that to happen, it is required to have some information abou

Iframe & the security risk

Web application security is always an important topic to discuss because websites seem to be the first target of malicious hackers. Hackers use websites to s

SQL injection through HTTP headers

During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing

Security Dangers of Web Management Interfaces

Web based interfaces are convenient for managing networking equipment, but under no circumstances should these be open to the world and the internet. Many ne

Cookie-based SQL injection

Did you say a "cookie" ? A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is used for an origin website to send state information to

W3af walkthrough and tutorial

w3af (Web Application audit and attack framework) is a framework for auditing and exploitation of web applications. In this series of articles we will be loo

How to Build a Secure RPC Interface for AJAX Apps With Google Web Toolkit

Why use GWT? Most modern web applications utilize an AJAX functionality of some sort to make them highly interactive and to have a user interface that works

CSRF and XSS: A Lethal Combination - Part I

Introduction In the second installment of this series, we discussed one of the most prevalent attacks to applications: SQL Injection. The previous discussion

Extending Burp Suite

Introduction There are multiple intercepting proxy tools available and Burp Suite is one of the best tools available for interception. If you are not yet fam

Burp suite walkthrough

Burp Suite is one of the best tools available for web application testing. Its wide variety of features helps us perform various tasks, from intercepting a r