Vulnerable Transmission of Credentials
If an application uses an unencrypted HTTP connection to transmit login credentials, an eavesdropper who is suitably positioned on the
Read moreIf an application uses an unencrypted HTTP connection to transmit login credentials, an eavesdropper who is suitably positioned on the
Read moreTransmitting Data via the Client Many applications leave themselves exposed because they transmit critical data such as product prices and
Read moreActiveX controls are a much more heavyweight technology than Java applets. They are effectively native Win32 executables that, once accepted
Read moreBesides HTML forms, the other main method for capturing, validating, and submitting user data is to use a thick-client component.
Read moreThe other principal way in which applications use client-side controls to restrict data submitted by clients occurs with data that
Read moreTransmitting Data via the Client It is very common to see an application passing data to the client in a
Read moreIt is often possible to infer a great deal about server-side functionality and structure, or at least make an educated
Read moreIt is normally possible to fingerprint the technologies employed on the server via various clues and indicators. Banner Grabbing Many
Read moreEnumerating as much of the application’s content as possible is only one element of the mapping process. Equally important is
Read more