The majority of interesting attacks against web applications involve targeting the server-side application itself. Many of these attacks do of […]
Category: Web Hosting
Install Let’s Encrypt to Create SSL Certificates
Install Let’s Encrypt to Create SSL Certificates What is Let’s Encrypt Let’s Encrypt is an SSL certificate authority managed by the […]
Securing Web Server Software
To some extent, an organization deploying a third-party web server product is inevitably placing its fate in the hands of […]
Finding Web Server Flaws
If you are lucky, the web server you are targeting may contain some of the actual vulnerabilities described in this […]
Encoding and Canonicalization Vulnerabilities
Encoding flaws have arisen in many kinds of web server software and present an inherent threat in situations where the […]
Path Traversal Vulnerabilities
Accipiter DirectServer This path traversal flaw could be exploited by placing URL-encoded dot-dot-slash sequences into a request. For more information […]
Vulnerable Web Server Software
Web server products range from extremely simple and lightweight software which does little more than serve up static pages, to […]
Attacking the Web Server
As with any kind of application, a web application is dependent on the other layers of the technology stack that […]
Buffer Overflow Vulnerabilities
Buffer overflow vulnerabilities occur when an application copies user-controllable data into a memory buffer that is not sufficiently large to […]
Technical Challenges Faced by Vulnerability Scanners
The barriers to automation described previously lead to a number of specific technical challenges that must be addressed in the […]