Skip to content
Corporate Blog

Corporate Blog

Opinions on Penetration Testing, Web-Application Security, Network Security, Mobile Security & Everything In Between

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram
Search
  • Home
  • Security Attacks
    • Cross-Site Request Forgery
    • Cross-Site Scripting
    • KRACK
    • SQL Injection
  • Databases
    • MSSQL
    • MySQL
    • Oracle
  • Recommendations
    • Data Breaches
    • Input Validation
    • Insecure Cryptographic Storage
    • Phishing Attacks
    • Redirect Abuse
  • Wireless
    • MAC Address Filtering
    • SSID
    • WPA
    • WPA2

Fixing Insecure Cryptographic Storage in ASP.NET

Posted on May 2, 2012July 12, 2019 by Yash

Note: This post is part of our series on “How to Fix Insecure Cryptographic Storage“. The series contains examples on

Continue Reading
.NET, ASP, Languages
One comment

Fixing Cross-site Scripting in ASP.NET

Posted on May 2, 2012July 12, 2019 by Yash

The HtmlEncode() method can be used when displaying text directly inside HTML tags using block: <% = Microsoft.Security.Application.AntiXss.HtmlEncode(this.txtName.Text) %>

Continue Reading
.NET, ASP, Cross-Site Scripting, Languages, Security Attacks
One comment

Fixing Insecure Cryptographic Storage in Java

Posted on May 1, 2012July 12, 2019 by Yash

Note: This post is part of our series on “How to Fix Insecure Cryptographic Storage“. The series contains examples on

Continue Reading
Java, Languages
One comment

How to Fix Insecure Cryptographic Storage

Posted on May 1, 2012July 12, 2019 by Yash

Hashing is the first step towards secure cryptographic storage of data before passing it to the database. It is advisable

Continue Reading
Insecure Cryptographic Storage, Recommendations
2 comments

How to Fix Cross-site Request Forgery Vulnerability(CSRF)

Posted on May 1, 2012July 12, 2019 by Yash

Cross-Site Request Forgery (CSRF) is an attack that allows a hacker to perform an action on the vulnerable site on

Continue Reading
Cross-Site Request Forgery, Security Attacks
Leave a comment

How to Fix Insecure Direct Object Reference Vulnerability

Posted on May 1, 2012July 12, 2019 by Yash

Many times application references an object (files) to generate web pages. A simple example is when a user requests his

Continue Reading
Input Validation, Recommendations
Leave a comment

Fixing SQL Injection in Hibernate

Posted on May 1, 2012July 12, 2019 by Yash

Note: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on

Continue Reading
Input Validation, Java, Languages, Recommendations, Security Attacks, SQL Injection
Leave a comment

Fixing Cross-site Scripting in Spring MVC

Posted on May 1, 2012July 12, 2019 by Yash

In Spring-MVC, form-tags are used to create jsp page. Spring MVC provides multiple options to encode the html-escape-sequences on server

Continue Reading
Frameworks, Java, Languages, Spring MVC
3 comments

Fixing Cross-site Scripting in Java

Posted on May 1, 2012July 12, 2019 by Yash

Use when the parameter is being echoed: <%@ taglib uri=”http://java.sun.com/jsp/jstl/core” prefix=”c” %> <p>Welcome <c:out value=”${user.name}” /></p> Use while taking the

Continue Reading
Input Validation, Java, JSP, Languages, Recommendations
2 comments

How to Fix Cross-site Scripting Vulnerabilities

Posted on May 1, 2012July 12, 2019 by Yash

Websites often accept user input for the application to display on the screen. If the application is not careful enough

Continue Reading
Cross-Site Scripting, Input Validation, Recommendations, Security Attacks
One comment

Posts navigation

«Previous Posts 1 2 3 4 5 Next Posts»

Quick Links

  • Popular
  • Categories
  • Archives
  • Tags
  • Fixing Cross-site Scripting in Spring MVC
    May 1, 2012
  • 5 Steps to Avoid Phishing Scams in E-mail
    December 25, 2012
  • How to Secure Home Wireless Network
    May 26, 2011
  • Fixing Cross-site Scripting in Java
    May 1, 2012
  • Wireless Security: How to Disable SSID Broadcast
    May 27, 2011
  • .NET (5)
  • ASP (5)
  • Cross-Site Request Forgery (1)
  • Cross-Site Scripting (3)
  • Data Breaches (1)
  • Databases (9)
  • Frameworks (1)
  • IBM AS/400 (2)
  • Input Validation (14)
  • Insecure Cryptographic Storage (1)
  • Java (6)
  • JSP (2)
  • KRACK (1)
  • Languages (20)
  • MAC Address Filtering (1)
  • MSSQL (4)
  • MySQL (1)
  • Office Events (1)
  • Oracle (4)
  • Phishing Attacks (1)
  • PHP (6)
  • Recommendations (18)
  • Red Team (1)
  • Redirect Abuse (1)
  • Security Attacks (16)
  • Security Audit (2)
  • Spring MVC (1)
  • SQL Injection (11)
  • SSID (2)
  • Weekly Cyber Security News (7)
  • Wireless (7)
  • WPA (1)
  • WPA2 (1)
  • February 2019 (1)
  • September 2018 (3)
  • August 2018 (5)
  • July 2018 (3)
  • October 2017 (1)
  • March 2014 (2)
  • December 2012 (3)
  • May 2012 (12)
  • May 2011 (16)
anti-virus AS/400 bank banks Cross-Site Request Forgery Cross-Site Scripting cryptography data breach data privacy Data Protection e-commerce security Facebook fraud hack hackers IBM IoT operating system Patch phishing RBI Red Team Assessment SAP scams security Security Audit Server ssl System System Architecture

Recent Posts

  • data-breach Data Breach : 5 Security Misconceptions
    February 4, 2019
  • sports-day-1 Sports Day: Back To School
    September 26, 2018
  • Red Team Security Brigade. Red Team: How We Compromised A Banks’ Network
    September 22, 2018
  • google play store trojan Weekly Cyber Security News: 3rd September 2018
    September 3, 2018
  • IBM AS/400 System Security Audit of IBM AS/400 and System i : Part 2
    August 22, 2018

Categories

  • Databases (9)
    • MSSQL (4)
    • MySQL (1)
    • Oracle (4)
  • Frameworks (1)
    • Spring MVC (1)
  • Languages (20)
    • .NET (5)
    • ASP (5)
    • Java (6)
    • JSP (2)
    • PHP (6)
  • Office Events (1)
  • Recommendations (18)
    • Data Breaches (1)
    • Input Validation (14)
    • Insecure Cryptographic Storage (1)
    • Phishing Attacks (1)
    • Redirect Abuse (1)
  • Red Team (1)
  • Security Attacks (16)
    • Cross-Site Request Forgery (1)
    • Cross-Site Scripting (3)
    • KRACK (1)
    • SQL Injection (11)
  • Security Audit (2)
    • IBM AS/400 (2)
  • Weekly Cyber Security News (7)
  • Wireless (7)
    • MAC Address Filtering (1)
    • SSID (2)
    • WPA (1)
    • WPA2 (1)

About Security Brigade

Security Brigade a CERT-In empanelled founded on the core belief that "Great audits are done by great auditors - not expensive tools". Our proprietary E.D.I.T.E platform provides a workflow based testing engine that encapsulates the complete audit process. It allows expert auditors to focus on in-depth manual testing while assisted by a combination of proprietary, open-source and commercial technology.
Read More about SB

Archives

  • February 2019 (1)
  • September 2018 (3)
  • August 2018 (5)
  • July 2018 (3)
  • October 2017 (1)
  • March 2014 (2)
  • December 2012 (3)
  • May 2012 (12)
  • May 2011 (16)

Social Icons

  • Twitter
  • Facebook
  • LinkedIn
  • Instagram

Tag Cloud

anti-virus AS/400 bank banks Cross-Site Request Forgery Cross-Site Scripting cryptography data breach data privacy Data Protection e-commerce security Facebook fraud hack hackers IBM IoT operating system Patch phishing RBI Red Team Assessment SAP scams security Security Audit Server ssl System System Architecture
Made with ❤ at Security Brigade © 2020 All rights reserved.