Here you will find a collection of white papers, articles, how-tos and more.
Some are located at this site, while others are on external ones.
If you have, or know about an article, or paper, that you think should be included,
please send me an email about it, or write a comment.
This paper focuses on hacking techniques of web applications and how the implementation of security through programming can keep intruders from wreaking havoc on your system. The paper will define a web application and discuss the architecture of the web application, as it will explain the multiple tier theory. The paper will discuss security in web applications and will look at basic rules in information security planning. The paper will look at seven steps in web application hacking and the top ten vulnerabilities that criminals can exploit in order to gain access and take control of a computer system.
This paper focuses on educating the security professionals with the risks associated with this situation and tries to give brief understanding of various kinds of attacks that attacker may launch and outline of various strategies that can be evaluated and adopted to protect the valuable information assets.
About three years ago, the concept of "Cross Site Tracing"
was introduced to the web application security community. In
essence, the classic XST is about amplifying an existing XSS
vulnerability such that HttpOnly cookies and HTTP authentication
credentials can be compromised.