Quantcast
Channel: Web Application Security Testing
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

CakePHP Application Cybersecurity Research – Bypassing security mechanisms in...

Vulnerability Scanning of CakePHP Applications If you want to perform vulnerability scanning of your CakePHP-based web application, you have to make sure to correctly configure your scanner....

View Article



Image may be NSFW.
Clik here to view.

CakePHP Application Cybersecurity Research – Hiding in Plain Sight: The...

!This is the fourth article in the “CakePHP Application Cybersecurity Research” series where I describe the serious impact of SQL injection vulnerability. Here you can find the other ones in the...

View Article

Image may be NSFW.
Clik here to view.

CakePHP Application Cybersecurity Research – The Impact of a PHP...

In this article As someone who tests web application security cautiously, Dawid discovered a vulnerability in MISP, a popular open-source platform for sharing and analyzing threat information. This...

View Article

Image may be NSFW.
Clik here to view.

CakePHP Application Cybersecurity Research – Exploring the PHAR...

In this article, we are going to explore the topic of PHAR deserialization php vulnerability that Dawid found in a white box testing. Before we continue, let’s talk about PHAR a little bit and after...

View Article

Image may be NSFW.
Clik here to view.

CakePHP Application Cybersecurity Research – Protect Your Website from Stored...

Stored Cross-Site Scripting (XSS) are relatively common and dangerous vulnerabilities that can compromise your web application’s security. In this article, we will discuss what stored XSS attacks are,...

View Article


Image may be NSFW.
Clik here to view.

CakePHP Application Cybersecurity Research – Be Careful with Reflections For...

Web application security is a critical aspect of maintaining secure and reliable online services. One of the most commonly exploited vulnerabilities in web applications is reflected Cross-Site...

View Article

Image may be NSFW.
Clik here to view.

CakePHP Application Cybersecurity Research – Forgotten Endpoint:...

Web applications are often the first target for attackers due to the vast amount of sensitive information they contain. Ensuring the security of these applications is crucial to protect both users and...

View Article

Image may be NSFW.
Clik here to view.

Black-box vs. Grey-box vs. White-box: Which Penetration Test Is Right for You?

You need to know if your company’s security controls and defenses can withstand a real cyber attack. Penetration testing is how you find out, but with three main types, black-box, grey-box, and...

View Article


Image may be NSFW.
Clik here to view.

As an AI Language Model, Please Have Mercy on Me

Before starting, there is one thing to clarify. This article is not about “How to use the benefits of AI language models while conducting penetration test”. This article is about “How to conduct a...

View Article


Image may be NSFW.
Clik here to view.

What do Cyber Threat Actors do with your information?

In today’s digital age, the threat of data breaches is a constant concern. Hackers are becoming more sophisticated in their techniques, targeting individuals and businesses alike. The consequences of...

View Article
Browsing latest articles
Browse All 10 View Live




Latest Images