The Web Application Hacker’s Methodology
All in all, we came so far with our lessons. This is the last one that will talk about the different kinds of the attacks connected to the web applications. We provided you with a […]
All in all, we came so far with our lessons. This is the last one that will talk about the different kinds of the attacks connected to the web applications. We provided you with a […]
There are several different encoding schemes which web apps use for their data encoding. As we know, HTTP and HTML protocols are text-based. In that purpose, the different encoding schemes are used, ensuring that the […]
This is the full name of the protocol best know as HTTP. Let’s start with an explanation why is it used. It is used to access the World Wide Web and is also used by […]
Anyone who is going to design the app needs to think about its proper security measures that need to be taken because it will in the most cases been attacked by dedicated and very skilled […]
Every minute, an innocent internet surfer is the victim of malicious cyber-attacks, it for these reasons that internet security tips are essential. With infinite possibilities and unknown loopholes, the internet is wary to a plethora […]
What is DOM based cross site scripting? Web developers are working hard round the clock to test websites for loopholes that can be exploited, and attackers are working hard to find vulnerabilities in the code […]
With the ever growing threat to online security, it is important for developers to find relevant shortcomings in their code. A File path traversal also known as directory traversal is a type of cyber attack […]
What is Clickjacking? How many times have you been redirected to a page you did not intentionally click on? Pop-ups, pages containing obscene images that randomly open up WebPages you didn’t click on; all fall […]
In the wake of the increase in a number of cyber-attacks, ensuring online security has become absolutely essential. A necessity for every web page that holds sensitive user data and utilized by millions of online […]
“SQL Injection“, the terms itself refer to one kind of attack. When attackers execute malicious SQL statements affecting your website or any web application, it is termed out SQL Injection. This is one of the most […]
Copyright © 2020 Gotowebsecurity