Looking into the world of security there are many attack vectors with respect to validations of the input in the wild. It is more prominent in the world of Web Applications but with respect to the infrastructure each and every thing which accepts an input is surrounded by a large bag of variety of Attack Vectors. Some of which are KNOWN to us and some of which are UNKNOWN.
To avoid of what are known to us is do a proper input validation. Seldom developers are able to cover all the aspects of input validation which leave the application more vulnerable. Out of all those vulnerabilities the article extends a little to talk about a famous Vulnerability “CSRF” and the attack vectors in concern with it .Once we are clear about CSRF attack and the attack vectors we will check on how to find the flaw in a web application while testing with the help of tool in handy from OWASP known as CSRF Tester.
Attack Vector
When I first heard this term I thought it is very similar to the Initialization vector of Cryptography but on further reading, it made me clearer on what is actually....
Author
Latest Articles
- Our AuthorsFebruary 19, 2018Meet our expert - Cordny Nederkoorn
- BlogJuly 11, 2017For the Love of The Game by Jessica Gulick
- BlogJune 29, 2016Finding Advanced Malware Using Volatility
- BlogJuly 3, 2015Banana Pi Pro - Review
[…] vector is a path or means through which a hacker gains access to your digital content,” says Amit Kumar Sharma. Here are potential school district attack […]
Good article
togel singapore