CakePHP Application Cybersecurity Research – Bypassing security mechanisms in...
Vulnerability Scanning of CakePHP Applications If you want to perform vulnerability scanning of your CakePHP-based web application, you have to make sure to correctly configure your scanner....
View ArticleCakePHP Application Cybersecurity Research – Hiding in Plain Sight: The...
!This is the fourth article in the “CakePHP Application Cybersecurity Research” series where I describe the serious impact of SQL injection vulnerability. Here you can find the other ones in the...
View ArticleCakePHP Application Cybersecurity Research – The Impact of a PHP...
In this article As someone who tests web application security cautiously, Dawid discovered a vulnerability in MISP, a popular open-source platform for sharing and analyzing threat information. This...
View ArticleCakePHP Application Cybersecurity Research – Exploring the PHAR...
In this article, we are going to explore the topic of PHAR deserialization php vulnerability that Dawid found in a white box testing. Before we continue, let’s talk about PHAR a little bit and after...
View ArticleCakePHP Application Cybersecurity Research – Protect Your Website from Stored...
Stored Cross-Site Scripting (XSS) are relatively common and dangerous vulnerabilities that can compromise your web application’s security. In this article, we will discuss what stored XSS attacks are,...
View ArticleCakePHP Application Cybersecurity Research – Be Careful with Reflections For...
Web application security is a critical aspect of maintaining secure and reliable online services. One of the most commonly exploited vulnerabilities in web applications is reflected Cross-Site...
View ArticleCakePHP Application Cybersecurity Research – Forgotten Endpoint:...
Web applications are often the first target for attackers due to the vast amount of sensitive information they contain. Ensuring the security of these applications is crucial to protect both users and...
View ArticleBlack-box vs. Grey-box vs. White-box: Which Penetration Test Is Right for You?
You need to know if your company’s security controls and defenses can withstand a real cyber attack. Penetration testing is how you find out, but with three main types, black-box, grey-box, and...
View ArticleAs an AI Language Model, Please Have Mercy on Me
Before starting, there is one thing to clarify. This article is not about “How to use the benefits of AI language models while conducting penetration test”. This article is about “How to conduct a...
View ArticleWhat do Cyber Threat Actors do with your information?
In today’s digital age, the threat of data breaches is a constant concern. Hackers are becoming more sophisticated in their techniques, targeting individuals and businesses alike. The consequences of...
View Article
More Pages to Explore .....