Today's Question:  What does your personal desk look like?        GIVE A SHOUT

 ALL


  SQL Injection through HTTP Headers

During vulnerability assessment or penetration testing, identifying the input vectors of the target application is a primordial step. Sometimes, when dealing with Web application testing, verification routines related to SQL injection flaws discovery are restricted to the GET and POST variables as the unique inputs vectors ever. What about other HTTP header parameters? Aren’t they potential input vectors for SQL injection attacks? How can one test all these HTTP parameters and which vulnerability scanners to use in order to avoid leaving vulnerabilities undiscovered in parts of the appl...

20,514 0       SQL INJECTION CODE SECURITY HTTP HEADER


  Top 10 PHP Best Security Practices for Sys Admins

PHP is widely used for various of web development. However, misconfigured server-side scripting would create all sorts of problem. And here are php security best practices that you should aware when configuring PHP securely. Nowadays most of the web servers are operated under Linux environment (like: Ubuntu, Debian...etc). Hence, in the following article, I am going to use list top 10 ways to enhance PHP Security Best Practices under Linux environment.My sample setup for PHP Security Tips:DocumentRoot: /var/www/Default Web server: Apache Default PHP configuration file: /etc/php.iniDefaul...

4,874 0       PHP ADVICE CODE SECURITY SYSTEM ADMIN BEST PRACTICE