Secure coding November 16, 2020 Srinivas SQL Injection Vulnerabilities Exploitation Case Study In the earlier articles about SQL Injection, we discussed how SQL Injection vulnerabilities can be identified and exploited. We also discussed what coding...
Secure coding November 16, 2020 Srinivas SQL Injection Vulnerabilities: Types and Terms In the previous article, we briefly discussed SQL Injection vulnerabilities and what type of features cause SQL Injection vulnerabilities. This article provides...
Secure coding November 16, 2020 Srinivas Introduction to Databases (What Makes SQL Injections Possible) SQL Injection is one of the most dangerous vulnerabilities that can happen to web applications. For the same reason, it has occupied the first position in...
Secure coding October 28, 2020 Srinivas How To Exploit Improper Error Handling In the previous article, we discussed what Improper Error Handling vulnerabilities are and what causes them. This article provides an overview of how Improper...
Secure coding October 27, 2020 Srinivas Improper Error Handling Exploitation Case Study In the earlier articles about Improper error handling, we discussed how these vulnerabilities can occur. and how they can cause security issues. We discussed...
Secure coding October 27, 2020 Srinivas Why Improper Error Handling Happens Improper Error Handling is one of the commonly seen issues in software. Web Applications are no different and they are susceptible to improper error handling...
Secure coding October 27, 2020 Srinivas CSRF Exploitation Case Study In the earlier articles about Cross Site Request Forgery, we discussed how these vulnerabilities can be identified and exploited. We discussed how Cross Site...
Secure coding October 20, 2020 Srinivas How to exploit CSRF Vulnerabilities In the previous article, we discussed what CSRF vulnerabilities are and what causes CSRF vulnerabilities. This article provides an overview of how CSRF vulnerabilities...
Secure coding October 20, 2020 Srinivas How to mitigate CSRF Vulnerabilities In the earlier articles about Cross Site Request Forgery, we discussed how these vulnerabilities can be identified and exploited. We discussed how Cross Site...
Secure coding October 20, 2020 Srinivas How to mitigate CSRF Vulnerabilities In the previous articles, we discussed what Cross Site Request Forgery vulnerabilities are and how one can detect and exploit them. From a developer’s view...