Yuvraj TodankarforBreachForcebreachforce.net·14 hours agoJWT Token Manipulation: A Wake-Up Call for Developers on Access Control and Data SecurityIntroduction Let’s set the scene: You’re logging into a website, feeling pretty secure about your data. You trust that the developers have done everything right. Now, imagine a scenario where, with just a few small adjustments, someone can gain acce...DiscussJWT token,JSON Web,Token,Token authentication,Access token,JSON token,JWT security,JWT authentication,Token-based authentication,JWT decoding,JWT implementation
Anasanasmansuri.hashnode.dev·Sep 30, 2024Enhance Web Application Security Using AWS WAFOver the past couple of years, security has become a crucial concern for most companies. Fortunately, there are many services available to help you improve the overall security of your AWS environment. AWS WAF (Web Application Firewall) is a firewall...DiscussAWS
D V Shashidhar Reddysik2912.hashnode.dev·Sep 19, 2024Will Bot Management Replace Traditional WAFs?As web application security continues to evolve, organizations are constantly balancing different tools to protect against an increasing array of threats. Two components in modern web security are Web Application Firewalls (WAFs) and Bot Management s...DiscussSecurity tools
Krishna Ketan Raikrikera.hashnode.dev·Aug 11, 2024The Developer's Guide to .env Files: Securing Your Web AppWhen it comes to web application development, handling confidential data such as API keys, database credentials, and other configuration details is crucial for both security and functionality. The .env file is a common tool used by developers for thi...Discuss·43 readssecure configuration
Michael Johnsonmiacheljhonson.hashnode.dev·Aug 7, 2024The Role of APIs in Web DevelopmentWhat is an API? An API, or Application Programming Interface, is a set of rules, protocols, and tools that enable different software applications to communicate with one another. In simplest terms, it serves as an intermediary that allows two softwar...DiscussWeb Development
Keqingsmellgoodkeqingsmellgood.hashnode.dev·Jul 29, 2024[SEC Playground: Half Year CTF 2024] - HesitationIntroduction to Challenge You have been hired to hack into a competitor's company, which is working on a Monitor System project. If you succeed, your employer will reward you handsomely. Format: web{...} Web application was a monitoring system with ...Discuss·1 like·94 readsSEC Playground: Half Year CTF 2024CTF Writeup
SWATHI PUNREDDYswathireddy.hashnode.dev·May 26, 2024Project: Implementing Auto Scaling in AWS with AWS WAF for Enhanced Application Availability and SecurityObjective The objective of this project is to implement AWS Auto Scaling to ensure high availability and optimal performance of a web application. Additionally, the project integrates AWS Web Application Firewall (WAF) to enhance the security of the ...Discuss·9 likes·135 readsAWS
Mohammad ZaheriforVoorivex's Teamblog.voorivex.team·Mar 5, 2024$20,300 Bounties from a 200 Hour Hacking ChallengeBack to July 2023, Mohammad Nikouei and I decided to dedicate 100 hours to working on the public BB program on BugCrowd. We worked on the program part-time, spending 4 to 6 hours per day on it each. The program we chose was a famous and big company, ...Hossein Golzari and 1 other are discussing this2 people are discussing thisDiscuss·99 likes·12.7K readsbugbounty
Ismail Harikismailharik.hashnode.dev·Jan 15, 2024A Step-by-Step Exploration of Spring Security 6Introduction: I'd like to start by letting you know that the inspiration behind this blog post comes from Ali Bouali. I want to sincerely thank Ali Bouali for initiating the sharing of this fantastic content. Your contribution is greatly appreciated...Discuss·328 readsSpring Security 6
Ishikha raoishikarao.hashnode.dev·Dec 14, 2023An Ultimate Guide to Web Application SecurityNowadays, web developers have to be vigilant as cyberattacks are on the rise. The security of their web app must be their top priority. The concept of web application security covers a large array of practices ranging from secure coding to penetratio...Discuss Web Application Security