Tabnabbing Protection Bypass

Tabnabbing Protection Bypass

Since its inception, the Uniform Resource Locator (URL) has been a fundamental part of the World Wide Web. It is easily located in your current browser's address bar. If you were not already very familiar with URLs, it would be easy to conclude that they always start with either 'http://' ... Read More
Fragmented SQL Injection Attacks – The Solution

Fragmented SQL Injection Attacks – The Solution

Ask someone how they'd detect whether a SQL Injection vulnerability exists in a web application and they're likely to suggest putting a single quote into a parameter in the application. Then, if they received an error, they could infer the presence of an SQL Injection vulnerability. Don't be surprised if ... Read More

Exposing the Public IPs of Tor Services Through SSL Certificates

The Onion Router, also known as Tor, is an internet service that provides anonymous internet surfing to users by bouncing the connection on several relays. By doing this Tor users avoid exposing their IP addresses to the servers they visit. Instead, these servers see only the IP address of one ... Read More
Web Browser Address Bar Spoofing

Web Browser Address Bar Spoofing

The Google security team state that the address bar is the most important security indicator in modern browsers. This part of the browser supplies both the true identity of the website and verification that you are on the right website. Eric Lawrence, the author of Fiddler, an HTTP debugging proxy, ... Read More

The Powerful Resource of PHP Stream Wrappers

| | php, php-stream-wrappers
Introduced in PHP 4.3, streams are little known powerful resources that PHP provides. In this article, we will explore ways to bypass protection methods using the PHP Stream Wrappers, which are responsible for handling protocol related tasks like downloading data from a web or ftp server and exposing it in ... Read More
Dangers of Open Git Folders

The Dangers of Open Git Folders

| | open-git-folders
Finnish computer scientist, Linus Torvalds, changed the world twice in his lifetime. The first time was roughly 25 years ago when he wrote the Linux kernel; the second was when he developed the revolutionary Git – the open source, distributed version control system (VCS). Git is a great system. However, ... Read More
NoScript Vulnerability in Tor Browser

NoScript Vulnerability in Tor Browser

Tor is the system preferred by users who wish to browse the internet anonymously. You can either set Tor up individually on your computer or mobile device, or in conjunction with the Tor Browser. Tor Browser is careful to maintain your privacy by protecting your IP and fingerprint, which are ... Read More
Analyzing Impact of WWW Subdomain on Cookie Security

Analyzing Impact of WWW Subdomain on Cookie Security

With the release of Chrome 69, Google opted to hide the www and m subdomains from the address bar, claiming that they’re not used anymore and therefore don't need to be displayed in the address bar. Is the www subdomain really as trivial as Google claims? This apparently tiny detail ... Read More
Final Nail in the Coffin of HTTP: Chrome 68 and SSL/TLS Implementation

Final Nail in the Coffin of HTTP: Chrome 68 and SSL/TLS Implementation

| | http, security, ssl, TLS
Google released Chrome version 68 in late July 2018, marking the start of a new era for secure web browsing. From version 68 onwards, all websites using HTTP will be marked as Not Secure on Chrome browsers. Starting with Chrome 69, we will no longer see the green lock icon ... Read More
Exploiting a Microsoft Edge Vulnerability to Steal Files

Exploiting a Microsoft Edge Vulnerability to Steal Files

In 2015, Microsoft released the Edge browser. When it was first developed, it was named Project Spartan. Unlike Internet Explorer, Edge supports a wide range of modern security measures such as Content Security Policy (CSP), as well as modern JavaScript and CSS features. Ditching the development of Internet Explorer and ... Read More
Loading...