DOM XSS stands for Document Object Model-based Cross-site Scripting. A DOM-based XSS attack is possible if the web application writes data to the Document Object Model without proper sanitization. The attacker can manipulate this data to include XSS content on the web page, for example,…
Exploiting SQL Injection: a Hands-on Example
In this series, we will be showing step-by-step examples of common attacks. We will start off with a basic SQL Injection attack directed at a web application and leading to privilege escalation to OS root. SQL Injection is one of the most dangerous vulnerabilities a…
Critical CSRF Vulnerability on Facebook
A security researcher Youssef Sammouda (Samm0uda) recently discovered a critical CSRF (Cross-site Request Forgery) security vulnerability on Facebook. This security issue could have been used to take over any Facebook user account. Samm0uda reported the bug on January 26 and Facebook fixed it just 5…
Paul’s Security Weekly Episode: Web App Scanning with Authentication.
Benjamin Daniel Mussler, Senior Security Researcher at Acunetix meets with Paul at Paul’s Security Weekly to discuss how Acunetix handles authentication to broaden the scan surface and why a web vulnerability scanner should be able to log into protected areas.
Setting Up A Self-Signed TLS/SSL Certificate on Apache
SSL is a fundamental piece of technology when you want to run a protected Apache site. SSL certificates permit you to scramble all the traffic sent to and from your Apache site to keep others from seeing the majority of the traffic. It utilizes open…
Acunetix Web Application Vulnerability Report 2019
Acunetix compiles an annual web application vulnerability report. The purpose of this report is to provide security experts and interested parties with an analysis of data on vulnerabilities gathered over the previous year. The 2019 report contains the results and analysis of vulnerabilities, detected from…
A fresh look on reverse proxy related attacks
In recent years, several researches have been published about attacks deliberately or directly related to reverse proxies. While implementing various reverse-proxy checks on the scanner, I started analyzing implementations of reverse proxies. Initially, I wanted to analyze how both reverse proxies and web servers parse…
Application Security Weekly: Reverse Proxies Using Weblogic, Tomcat, and Nginx
Aleksei Tiurin, Senior Security Researcher for Acunetix joins Paul’s Application Security Weekly show, for a technical segment on reverse proxies using weblogic, Tomcat, and Nginx.
How to Stop Old, Backup and Unreferenced Files from Leaking Sensitive Information
The very real threat of information disclosure by means of inadvertent exposure of sensitive files has been a constant source of woe for corporations and individuals alike. Despite having the potential for serious repercussions including legal ones, many webmasters, administrators and developers have struggled to…