Attack Vector

Dec 5, 2014

 

Looking into the world of security there are many attack vectors with respect to validations of the input in the wild. It is more prominent in the world of Web Applications but with respect to the infrastructure each and every thing which accepts an input is surrounded by a large bag of variety of Attack Vectors. Some of which are KNOWN to us and some of which are UNKNOWN.

To avoid of what are known to us is do a proper input validation. Seldom developers are able to cover all the aspects of input validation which leave the application more vulnerable. Out of all those vulnerabilities the article extends a little to talk about a famous Vulnerability “CSRF” and the attack vectors in concern with it .Once we are clear about CSRF attack and the attack vectors we will check on how to find the flaw in a web application while testing with the help of tool in handy from OWASP known as CSRF Tester.

Attack Vector

When I first heard this term I thought it is very similar to the Initialization vector of Cryptography but on further reading, it made me clearer on what is actually....

Subscribe
Notify of
guest

2 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
trackback

[…] vector is a path or means through which a hacker gains access to your digital content,” says Amit Kumar Sharma.  Here are potential school district attack […]

thania
7 years ago

Good article
togel singapore

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023