Attacking Other Users
The majority of interesting attacks against web applications involve targeting the server-side application itself. Many of these attacks do of course
Read moreThe majority of interesting attacks against web applications involve targeting the server-side application itself. Many of these attacks do of course
Read moreJust as there is no unique signature by which logic flaws in web applications can be identified, there is also
Read moreThe best way to learn about logic flaws is not by theorizing, but through acquaintance with some actual examples. Although
Read moreAll web applications employ logic in order to deliver their functionality. Writing code in a programming language involves at its
Read moreBy far the most effective means of eliminating path traversal vulnerabilities is to avoid passing user-submitted data to any file
Read morePath traversal vulnerabilities are often subtle and hard to detect, and it may be necessary to prioritize your efforts on
Read moreMany kinds of functionality oblige a web application to read from or write to a file system on the basis
Read moreThe Lightweight Directory Access Protocol (LDAP) is used for accessing directory services over a network. A directory is a hierarchically
Read moreMany applications contain a facility for users to submit messages via the application; for example, to report a problem to
Read moreThe XML Path Language (or XPath) is an interpreted language used for navigating around XML documents, and for retrieving data
Read more