Hacking A Web Application: Authentication Part 1 | Latest News RSS feed

Hacking A Web Application: Authentication Part 1 - Latest News

Hacking a Web Application: Authentication (Part 1)

Check for any other sources of information leakage within the application that may enable you to compile a list of valid usernames. Locate any subsidiary authentication that accepts a username and det... read more

Your data is “for sale” – And this is how you get it back

SEE ALSO: Public cloud becomes No.1 priority for companies ... detailed an overview of the movement to decentralize the web, yet the examples of companies and projects that were part of this movement ... read more

XSS, Cookies, and Session ID Authentication – Three Ingredients for a Successful Hack

Cross site scripting (XSS) attacks are often seen as a powerless hack. While this is true in some cases, for the most part the impact of ... and how it was used to bypass the authentication scheme of ... read more

Looking for another news?

What is a Java servlet? Request handling for Java web applications

Request handling is the bread and butter of Java web application development ... is needed to run the operating system. Figure 1 shows these three components in a layered diagram. You could also look ... read more

Your mid-market business needs encryption and authentication

Lists of hacked ... the network, web server, application server, database, app system or hard disk drive are vulnerable. Only encryption at the application layer is secure. Why is this the case? If da... read more

5 Top Techniques for Testing Blockchain Apps

Considering the stats mentioned above, along with the basic nature of blockchain applications ... of the important components that tested as a part of functional testing are: Block Size: as ... read more

Create API Rest with Laravel 5.6 Passport Authentication (Part 1)

We learning to create a authentication ... This will instruct your application to use Passport's TokenGuard when authenticating incoming API requests: We will create api routes. Laravel provide routes ... read more

How to Hack an Election

Every investigation or election contest brings to light glaring irregularities, errors, misconduct on the part of election officers ... a five-point briefing paper. (Point 1: "The November 2016 electi... read more

How to Control API Security Risks

"To close the door on security risks and protect their customers, companies need to treat APIs with the same level of protection that they provide for their business-critical web applications ... it i... read more

The 10 Most Common Application Attacks in Action

Nowadays, application ... Web Application Security Project (OWASP). The organization has put together a list of the 10 most common application attacks. This list is renewed every three years, with the ... read more

Implementing an Authentication Flow Part 1: Initial Design

This series of article presents a way to perform authentication flow in a React-Native application using Redux, Amazon Web Services (AWS), and multiple ... a function with the following characteristic... read more

FeedsRSS Created by. Full RSS Feed | Privacy Policy | Contact Us