Auditing an application protected by a CSRF token with Stepper Introduction The CSRF token is a protection that requires the insertion of a random and dynamic value in a request. This value is then analysed by the... 29.08 Applications
How to secure a server? Server security is a major issue for companies. Indeed, being a central element in the functioning of all the components of an information system (app... 19.07 Applications
SQL injections (SQLi): principles, impacts, exploitations and security best practices Most web applications use one or multiple databases to store and process information in real time. Indeed, when a user sends requests, the web applica... 07.07 Applications
CSRF attacks: principles, impacts, exploitations and security best practices CSRF attacks are often used to compromise the data and features of a web application. Principles, impacts, possible exploitations, we present in this ... 28.06 Applications
How to increase risk awareness to prevent social engineering attacks? Over the years, social engineering attacks have become a reality for all companies, regardless of their sector of activity or size. Beyond the technic... 06.05 Phishing & Social Engineering
How to secure an internal network? Network security is a major challenge for companies. Indeed, the growing importance of IT assets, the interconnection of information systems and their... 25.04 Infra & Network
How to strengthen the security of your APIs to counter the most common attacks? APIs are everywhere. In most IT systems (mobile applications, web platforms, cloud infrastructures, etc.) and in all sectors of activity, these progra... 20.04 Applications
Node.js: Common vulnerabilities and security best practices Another article on Node.js security? But in this one, we focus on the most common vulnerabilities encountered during penetration testing. Node related... 22.03 Applications
RCE vulnerability in a file name During our security audits, we are regularly confronted with vulnerabilities that allow commands to be executed on a system. These can take various fo... 17.03 Applications
How to secure a website? The security of websites (e-commerce websites, corporate websites, SaaS platforms and other web applications) is a major issue for companies. Being ex... 25.02 Applications
Understanding and preventing the path traversal vulnerability In which cases can a path traversal vulnerability occur? How to detect this flaw and protect yourself from it? This is what we will detail in this art... 28.01 Applications
Server-Side Template Injection vulnerability: what it is and how to prevent it Server-side template injection (SSTI) vulnerabilities tend to be less researched than other types of flaws. However, their impact is significant and o... 29.12 Applications