Skip to navigation Skip to content Network Intelligence
Menu
  • Practices
    • Advanced Detection and Response
    • Continuous Threat Exposure Management
    • Governance Risk Management & Compliance
    • IoT and OT
    • Privacy Assurance
    • Responsible AI
    • Secure Digital Transformation
    • Zero Trust
  • Services
  • Resources
    • Blogs
    • Webinars
    • Whitepapers
    • Case Studies
    • Security Advisories
  • Partnerships
  • About Us
  • Contact Us
    • Career
Talk to an Expert
Transilience Talk to an Expert

Home » Web Application Security

  1. Home
  2. Web Application Security

Category: Web Application Security

Hacks Security Testing Web Application Security

Server Side Request Forgery (SSRF)

Introduction Is your server protected against port scanning?  The general answer will be “Yes, I have a firewall which restricts access to internal servers from […]

April 15, 2015
5
Case Studies Hacks Security Testing Web Application Security

The Lesser Known XE Attack

The Meaning XE which stands for XML Entity is a standard for representing sets of data. Meanwhile, Entities are more like shortcuts to standard text […]

November 18, 2014
1
Case Studies Web Application Security

Mitigating the Remote Code Execution in Bash

Introduction In the last post we saw how the recent bash vulnerability can be remotely exploited in a variety of ways. How do we defend […]

October 6, 2014January 10, 2025
0
Case Studies Research Web Application Security

Authorization Vulnerability in Yahoo! Pipes

Recently, I found an interesting issue qualifying on Yahoo! Pipes. But before going into the details of this specific issue, let’s understand some basic points. […]

July 3, 2014January 20, 2025
0
Case Studies Hacks Research Secure Coding Web Application Security

Owning The Enterprise With HTTP PUT

During a routine penetration testing engagement, we found an IIS webserver with HTTP methods (verbs) like PUT and DELETE enabled on it. During enumeration of […]

April 30, 2014
4
Research Secure Coding Sql Injection Web Application Security

From SQL Injection To 0wnage Using SQLMap

SQL injection – one of the most critical vulnerabilities till now – is still included in the OWASP Top 10 list’s Injection flaws section. SQLMap […]

January 28, 2014
13
Hacks Research Secure Coding Web Application Security

SSL/TLS attacks: Part 3 – BREACH Attack

Browser Reconnaissance and Ex-filtration via Adaptive Compression of Hypertext (BREACH) Attack: Previously we learnt how CRIME attacks SSL/TLS using SSL/TLS compression. Now we look at […]

December 16, 2013
1
Hacks Research Secure Coding Web Application Security

SSL/TLS attacks: Part 2 – CRIME Attack

Compression Ratio Info-leak Made Easy (CRIME) attack: In the previous section we saw how the Chosen Plain-text attack was used to weaken the SSL/TLS protocol. […]

December 9, 2013
2
Hacks Research Secure Coding Web Application Security

SSL/TLS attacks: Part 1 – BEAST Attack

Recently there has been a lot of news about a new SSL/TLS based attacks which was demonstrated in this year’s BlackHat conference. The attack was […]

December 2, 2013
3
Case Studies Opinion Research Secure Coding Sql Injection Survey Web Application Security

[Survey] Web Application Security – Getting Coders To Code Securely

Web Application security has become the biggest concern for almost all organizations who wish to bring their business to the Internet. There are various reasons […]

September 6, 2013January 10, 2025
0
  • 1
  • 2

Sidebar

Recent Posts

  • Autonomous AI Pen Testing: When Your Security Tools Start Thinking for ThemselvesJanuary 24, 2025
  • HITRUST Certification for Healthcare: Leveraging Unified Compliance Approach for Maximum Data ProtectionJanuary 21, 2025
  • Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!January 16, 2025

Categories

  • All Topics
  • Digital
  • Marketing
  • Startups
  • Technology
  • Business

Tags

Cyber Security cybersecurity hacking malware Malware Analysis Penetration Testing pentesting red team

Follow us

  • LinkedIn
  • Facebook
  • Twitter
  • Instagram
  • YouTube
Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework. This framework ensures we can effectively assess, design, visualize, implement, sustain, and evolve your organization’s security posture.
Facebook-square Linkedin Instagram Youtube
Company
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
  • Practices
  • Services
  • Partnerships
  • About Us
  • Leadership
  • Blogs
Subsidiaries
  • Transilience
  • Ilantus
  • IISecurity
  • Transilience
  • Ilantus
  • IISecurity
Trainings
  • NI Training
  • BCI Training
  • NI Training
  • BCI Training
Contact us

contact@nic.instantlywebsite.com

© Network Intelligence - All rights reserved | Terms & Conditions | Privacy Policy
Top