Vulnerability Scanners
A number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of
Read moreA number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of
Read moreThe manual request component of the integrated test suites provides the basic facility to issue a single request and view
Read moreAfter the essential web browser, the most useful item in your toolkit when attacking a web application is an intercepting
Read moreSome attacks on web applications can be performed using only a standard web browser; however, the majority of them require
Read moreMany users access web applications from a shared environment in which an attacker may have direct access to the same
Read moreActiveX controls are of particular interest to an attacker who is targeting other users. When an application installs a control
Read moreSession fixation vulnerabilities typically arise when an application creates an anonymous session for each user when they first access the
Read moreJSON hijacking is a special version of an XSRF attack, which in certain circumstances can violate the objectives of the
Read moreFrame injection is a relatively simple vulnerability that arises from the fact that in many browsers, if a web site
Read moreHTTP header injection vulnerabilities arise when user-controllable data is inserted in an unsafe manner into an HTTP header returned by
Read more