Vulnerability Scanners

A number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of

Read more

Integrated Testing Suites

After the essential web browser, the most useful item in your toolkit when attacking a web application is an intercepting

Read more

Session Fixation

Session fixation vulnerabilities typically arise when an application creates an anonymous session for each user when they first access the

Read more

HTTP Header Injection

HTTP header injection vulnerabilities arise when user-controllable data is inserted in an unsafe manner into an HTTP header returned by

Read more