How WebSockets Work? Vulnerabilities and Security Best Practices WebSocket is a real-time bidirectional communication protocol designed for efficient data exchange between a client (web browser, application) and a s... 12.03 Applications
What is Clickjacking? Exploitations and Security Best Practices Clickjacking is a discreet but formidable attack technique. It exploits the user interface to trick victims into interacting with invisible or disguis... 21.02 Applications
Content Security Policy Bypass Techniques and Security Best Practices Content Security Policy (CSP) is an essential security measure for protecting web applications against certain types of attack. By defining strict rul... 12.02 Applications
What is Object Injection? Exploitations and Security Best Practices Object injection is an application vulnerability that occurs when an application deserializes untrusted data. If an attacker manages to inject a malic... 07.02 Applications
What is Blind SQL Injection? Attack Types, Exploitations and Security Tips Blind SQL Injections are a category of SQL injection. Unlike traditional SQL injections, they do not directly provide the results of queries or detail... 04.02 Applications
How to Detect Secrets? Tools and Techniques Before discussing techniques and tools, it is essential to define the ‘secrets’ sought during penetration tests. These secrets are generally private c... 13.01 Applications
XPath Injections: Exploitations and Security Tips Although XML is an old language, it is still widely used, particularly in the banking sector. If you’re a pentester or a developer, you’re... 13.01 Applications
What is Buffer Overflow? Attacks, Types and Security Tips Buffer overflow is one of the oldest and most exploited vulnerabilities. Despite this long history, they remain a major threat today. Whether on serve... 06.01 Applications