SQLi – How it works (Part 1)

In this 6 part series on SQLi (SQL Injection) we shall be describing the vulnerability and its variants, showing how it works and what an attacker can do with it. SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL…

Read more

Acunetix Port Scanner

The Acunetix Port Scanner performs a port scan against the server hosting the scanned website. When open ports are found, Acunetix Web Vulnerability Scanner will proceed with network level security checks against the network service running on that port, such as DNS Open Recursion tests,…

Read more

XSS in Google Feedburner

A fundamental aspect of web applications which developers should bear in mind is securing the input inserted by the user.  Many times, due to lack of attention or understanding, programmers might ignore the review of the code, resulting in security breaches, which through exploiting represent…

Read more