Secure coding

How to Exploit Poor HTTP Usage

In the previous article, we discussed some fundamental concepts associated with the HTTP protocol and risks associated with it if it is used improperly. In t

Introduction to HTTP (What Makes HTTP Vulnerabilities Possible)

Understanding HTTP protocol and risks associated with the improper use of it in applications is an important step towards understanding application security.

How to Mitigate Integer Overflow and Underflow Vulnerabilities

Introduction to Integer Overflows and Underflows Integer overflow and underflow vulnerabilities are simple but extremely powerful vulnerabilities.  They exi

How to exploit integer overflow and underflow

Integer overflows and underflows Integer overflow and underflow vulnerabilities can exist because of how memory and variables are handled in programming lan

Introduction to Parallel Processing

Introduction to Parallel Processing In the beginning, computers had a single processing core and were single-threaded.  While these computers would be able

What are Race Conditions?

Introduction to Race Conditions Parallelized applications have a number of different benefits.  They’re able to run faster, support multiple different users

How Are Credentials Used In Applications?

Introduction Use of credentials is one of the most common aspects of applications. Be it a web application or a mobile client application, applications ofte

How To Exploit Least Privilege Vulnerabilities

Introduction In the previous article, we discussed the importance of access controls and understood that the principle of least privilege is an essential co

XSS Vulnerabilities Exploitation Case Study

Introduction In the earlier articles about SQL Injection, we discussed how SQL Injection vulnerabilities can be identified and exploited. We also discussed

What is is integer overflow and underflow?

This article provides an overview of Integer Overflow and Overflow vulnerabilities and how they can be exploited. Integer Overflows and Underflows occur due