Why Is Directory Listing Dangerous?

Why Is Directory Listing Dangerous?

Directory listing is a web server function that displays the directory contents when there is no index file in a specific website directory. It is dangerous to leave this function turned on for the web server because it leads to information disclosure. For example, when... Read more The post Why ... Read More
What Are Google Hacks?

What Are Google Hacks?

The terms Google hacking, Google hacks, or Google dorking refer to attacks that use Google or another search engine to find vulnerable web servers and websites. Google hacking is based on inventing specific search queries, often using wildcards and advanced search operators (such as intitle,... Read more The post What ... Read More
HTTP Security: A Security-Focused Introduction to HTTP

HTTP Security: A Security-Focused Introduction to HTTP

| | articles, Web Security Zone
HTTP is a ubiquitous protocol and is one of the cornerstones of the web. If you are a newcomer to web application security, a sound knowledge of the HTTP protocol will make your life easier when interpreting findings by automated security tools, and it’s a... Read More → The post ... Read More
What Is Path Traversal?

What Is Path Traversal?

| | articles, Web Security Zone
Path Traversal or as it is otherwise known, Directory Traversal, refers to an attack through which an attacker may trick a web application into reading and subsequently divulging the contents of files outside of the document root directory of the application or the web server.... Read More → The post ... Read More
How to Prevent Blind SQL Injections: The Basics

How to Prevent Blind SQL Injections: The Basics

| | articles, Web Security Zone
Blind SQL Injections are a subtype of SQL Injection vulnerabilities. Exploiting Blind SQL Injections is more difficult and more time consuming for the attacker but the consequences to web application security are similar. Successful exploitation of the database query language gives the attacker control over... Read More → The post ... Read More
Secure Your Node.js .env Files

Secure Your Node.js .env Files

Node.js is an environment that helps you create server-side applications using JavaScript. One of the common Node.js elements that developers like and use are .env files. These files let you easily save and load environment variables. Developers often use them to store confidential information. However,... Read More → The post ... Read More
How to Stop Old, Backup and Unreferenced Files from Leaking Sensitive Information

How to Stop Old, Backup and Unreferenced Files from Leaking Sensitive Information

| | articles, Web Security Zone
The very real threat of information disclosure by means of inadvertent exposure of sensitive files has been a constant source of woe for corporations and individuals alike. Despite having the potential for serious repercussions including legal ones, many webmasters, administrators and developers have struggled to contain this common issue for ... Read More
How to Verify a Cross-site Scripting Vulnerability

How to Verify a Cross-site Scripting Vulnerability

| | articles, Web Security Zone
Analyzing web application vulnerabilities discovered by an automated scanner such as Acunetix often requires us to investigate further. This is in order to: Verify the vulnerability exists in the context of the application. Adjust the vulnerability payload reported by the scanner to something more invasive (i.e. keylogger) in order to ... Read More
Why Scoping Cookies to Parent Domains is a Bad Idea

Why Scoping Cookies to Parent Domains is a Bad Idea

| | articles, Web Security Zone
When dealing with Web Application vulnerability assessments, it is very common to come across scenarios where for various reasons (business or otherwise) users decide to focus entirely on Medium or High severity vulnerabilities such as SQL Injection and XML External Entity Injection. As a result, developers and security professionals tend ... Read More
What is Web Cache Poisoning?

What is Web Cache Poisoning?

| | articles, Web Security Zone
How does Caching work? All forms of Caching in computer science, whether it be CPU cache, HTTP Web Server cache, Database cache and so on, aims to speed up response times for whatever is requested. Doing so helps reduce load as much as possible on the component that is being ... Read More