Fixing Insecure Cryptographic Storage in ASP.NET
Note: This post is part of our series on “How to Fix Insecure Cryptographic Storage“. The series contains examples on
Continue ReadingOpinions on Penetration Testing, Web-Application Security, Network Security, Mobile Security & Everything In Between
Note: This post is part of our series on “How to Fix Insecure Cryptographic Storage“. The series contains examples on
Continue ReadingThe HtmlEncode() method can be used when displaying text directly inside HTML tags using block: <% = Microsoft.Security.Application.AntiXss.HtmlEncode(this.txtName.Text) %>
Continue ReadingNote: This post is part of our series on “How to Fix Insecure Cryptographic Storage“. The series contains examples on
Continue ReadingHashing is the first step towards secure cryptographic storage of data before passing it to the database. It is advisable
Continue ReadingCross-Site Request Forgery (CSRF) is an attack that allows a hacker to perform an action on the vulnerable site on
Continue ReadingMany times application references an object (files) to generate web pages. A simple example is when a user requests his
Continue ReadingNote: This post is part of our series on “How to Fix SQL Injection Vulnerabilities“. The series contains examples on
Continue ReadingIn Spring-MVC, form-tags are used to create jsp page. Spring MVC provides multiple options to encode the html-escape-sequences on server
Continue ReadingUse when the parameter is being echoed: <%@ taglib uri=”http://java.sun.com/jsp/jstl/core” prefix=”c” %> <p>Welcome <c:out value=”${user.name}” /></p> Use while taking the
Continue ReadingWebsites often accept user input for the application to display on the screen. If the application is not careful enough
Continue Reading