b1d0wsb1d0ws.hashnode.dev·Nov 19, 2024AppSec Project - Chapter 4, SAST Tools and ContainerizationIntroduction Hello! Today, we’ll explore testing various SAST tools to evaluate their effectiveness in helping us secure our application. Additionally, we’ll containerize our app and make final adjustments to bring the project to completion. Our bran...Discuss·103 readspentesting
Joel O.joelodey.hashnode.dev·Nov 17, 2024Lab: Broken brute-force protection, multiple credentials per requestLab Scenario: Our objective is to understand and exploit a web application's broken brute-force protection, where the login credentials are submitted in JSON format. By manipulating the request to submit multiple credentials, we aim to bypass the pro...Discuss·1 likePortSwigger Authentication Labswebsecurity
b1d0wsb1d0ws.hashnode.dev·Oct 29, 2024AppSec Project - Chapter 2, Manually fixing more vulnerabilitiesIntroduction Hello, and welcome to chapter 2 of our AppSec project! If you're not up to speed with what's going on, be sure to start with chapter 1. Today, we'll continue our journey of manually fixing vulnerabilities. Without further delay, let's st...Discuss·155 readsPostsSecurity
Romman Sabbirrommansabbir.com·Oct 27, 2024Android Security Approaches: Encryption and Secure PracticesIn this article, we explore essential security techniques and encryption methods to protect Android applications. Covering a broad spectrum of security approaches, we highlight the use of data encryption (AES, RSA, and Android KeyStore), secure user ...Discuss·91 readsAndroid : Security, Encryption and Secure Practicesapproaches
Shivanshi Singhshivanshi770.hashnode.dev·Oct 25, 2024Top Security Testing Tools for Ensuring Application SafetyIn today's digital age, ensuring application security is more crucial than ever. As cyber threats continue to evolve, businesses must be proactive in safeguarding their applications. Security testing tools play a vital role in identifying vulnerabili...DiscussSoftware Testing
Okoye Ndidiamakaamikdigital.hashnode.dev·Oct 14, 2024Secure Coding Practices to Protect Your Code in the Digital EraIn a world where cyber threats are continuously evolving, secure coding practices have become very significant. Writing secure code is something that every developer-from small project freelancers to enterprise-scale application developers-needs to f...DiscussWeb Development
Abhiramcloudbuddy.hashnode.dev·Oct 11, 2024The Human Element of Cybersecurity: A Deep DiveIn today's complex digital landscape, cybersecurity is a multifaceted challenge that requires a holistic approach. While technology plays a vital role in protecting organizations from threats, the human element is equally critical. In a recent episod...Discusscloud security awareness
Harshal Shahdelvingwithharshal.hashnode.dev·Sep 25, 2024Open Redirection Attacks: Comprehensive Analysis with Practical CasesIn the world of web application security, Open Redirection Attacks often go unnoticed but pose significant threats if left unchecked. These attacks can be exploited by malicious actors to redirect unsuspecting users to untrusted or malicious websites...DiscussFortify and Defend: Navigating the Cybersecurity Landscapeopen redirection
Joel O.joelodey.hashnode.dev·Aug 24, 2024Lab: HTTP request smuggling, basic TE.CL vulnerabilityLab Scenario: Our mission is to explore and exploit a simulated web application's vulnerability to HTTP request smuggling. We'll use the TE.CL technique to manipulate the transfer encoding and content length, revealing potential security weaknesses. ...Discuss·10 likes·26 readsPortSwigger HTTP request smuggling Labsportswigger
Vansh Goelvanshgoel27.hashnode.dev·Aug 23, 2024Understanding Cybersecurity: A crucial Pillar of Digital AgeIn today's interconnected world, cybersecurity is more than just a technical term it's a critical necessity. As our reliance on digital platform grows, so do the threats posed by cybercriminals. Whether it's protecting sensitive data, maintaining pri...Discussdigitalsafety