A Guide to Server-Side Template Injection (SSTI)
A Guide to Server-Side Template Injection (SSTI) January 01, 2023 Web Application Server-side template Injection (SSTI) occurs when an attacker injects a malicious payload into
Home / Blog
A Guide to Server-Side Template Injection (SSTI) January 01, 2023 Web Application Server-side template Injection (SSTI) occurs when an attacker injects a malicious payload into
Understanding Buffer Overflow: Protecting Systems from Vulnerabilities April 19, 2024 Web Application Tarak Sakhardande Introduction to Buffer Overflow Buffer overflow is an alarming security threat that
Securing Web Uploads: Extension Denylisting Feb 20, 2024 Web Application Tarak Sakhardande At the forefront of cybersecurity lies an ever-present battle between web defenders and
Subdomain Enumeration: Leveraging Web Architecture’s Power Feb 8, 2024 Web Application Tarak Sakhardande Subdomain enumeration is a critical process for researchers, security professionals, and enthusiasts
JWT: A Deep Dive into Algorithm Confusion Feb 1, 2024 Web Application Tarak Sakhardande Since the first time I studied JWT, I found it one
Understanding XML External Entity Injection (XXE) Attacks December 14, 2023 Web Application Tarak Sakhardande XML External Entity Injection (XXE) is a critical web security vulnerability
Web Cache Poisoning: A Comprehensive Guide to Protecting Your Website November 21, 2023 Web Application Tarak Sakhardande Web cache poisoning is a sophisticated attack. It
HTTP Parameter Pollution: Manipulating Web App Vulnerabilities October 31, 2023 Web Application Tarak Sakhardande HTTP Parameter Pollution (HPP) is a cunning technique employed by attackers
WebSocket Hijacking: Exploiting Vulnerabilities and Ensuring Security October 14, 2023 Web Application Tarak Sakhardande WebSocket hijacking is a critical security concern in modern web applications.
Understanding File Upload Vulnerabilities September 15, 2023 Web Application Tarak Sakhardande In the digital world, the practice of uploading files is a fundamental functionality across
Deciphering the Threat of Tabnabbing Attacks September 01, 2023 Web Application Tarak Sakhardande In the vast, interconnected realm of the internet, security threats are as
DOM-Based Cross-Site Scripting July 21, 2023 Web Application Tarak Sakhardande As the digital landscape continues to evolve, so do the threats that target web applications.
Redfox Cyber Security Inc.
8 The Green, Ste. A, Dover,
Delaware 19901,
United States.
info@redfoxsec.com
©️2024 Redfox Cyber Security Inc. All rights reserved.