WalkingEclipsewalkingeclipse.hashnode.dev·Nov 18, 2024A little something to get you started CTF WalkthroughFlag 0 … The first hint tells us we need to look at the source code. Go ahead and take a look … Do you spot anything out of the ordinary? You should’ve found something is missing from the webpage. The code indicates that there should be an image di...CTF's#cybersecurity
Varkey Thomasskinnyidiot.hashnode.dev·Sep 12, 2024Server Side Request ForgeryIntro: This vulnerability allows an attacker to force the server side of a web application to make requests to normally unauthorized locations. Brief: This attack occurs when an attacker modifies the URL sent from a web application, which can lead to...#cybersecurity
David JajaforfreeCodeCampfreecodecamp.org·Aug 31, 2023How to Set Up Social Media Web Authentication using FirebaseUser authentication is extremely important in the context of web development. The way users log in affects their overall experience and engagement with an application. It also affects how they initially perceive it. Authentication techniques are cont...authentication
Ry VeeforfreeCodeCampfreecodecamp.org·Sep 8, 2020The Best Application Security Tools in 2020Software has become more and more ubiquitous. Open source libraries are widely used as they make it easy for developers to focus on the core features of the applications they’re building. Using these open source libraries provides tremendous producti...Web App Security
Victoria DrakeforfreeCodeCampfreecodecamp.org·Sep 3, 2019SQL injection and XSS: what white hat hackers know about trusting user inputSoftware developers have a lot on their minds. There are are myriad of questions to ask when it comes to creating a website or application: What technologies will we use? How will the architecture be set up? What functions do we need? What will the U...Application Security
freeCodeCampforfreeCodeCampfreecodecamp.org·Jun 13, 2019The Story of requesting twice - CORSBy Lusan Das The story of requesting twice, allow me to explain how it all began. While working on a feature, I decided to look at the network tab and observed that the first request was sent with method OPTIONS, and the following request after it wa...api