Year: 2015

SQL Injection

SQL Injection is quite a common vulnerabilities, well known by most experienced developpers but still not managed correctly in lots of applications/websites. To see the number of vulnerabilities and the systems impacted, you can have a look at: cvedetails.com/sql-injection The

Posted in Vulnerabilities explained Tagged with: ,

HTTP Response Splitting

HTTP response splitting is a form of HTTP header injection, the goal is to force the server to inject our own HTTP header in the response. The principles HTTP request or response are based on the same principle:   Where

Posted in Vulnerabilities explained Tagged with:

Security Awareness for Developer Part 2: Setup a Security Lab

Right now, we know what is our goal, but we need to setup the security lab containing OWASPBWA for free and cross plateform (tested on Ubuntu and Windows 7). Prerequisites are (links are provided in the detail below): Virtualization software

Posted in Security for Web Developpers Tagged with: , , , , , ,

Security Awareness for Developer Part 1: Tool

How to learn in the best way? for me it is through example, luckily it is really easy to find example right now. I would recommend to use owaspbwa (OWASP Broken Web Applications Project) It is an VM file usable

Posted in Security for Web Developpers Tagged with: , , , ,