web-security-exploits
Articles
- Session hijackingExploitation of a valid computer session
- Evil twin (wireless networks)Method used to facilitate phishing
- Session poisoning
- Cross-site tracingNetwork security vulnerability exploiting the HTTP TRACE method
- Directory traversal attackComputer security vulnerability to gain unauthorized access to the file system
- Cross-site request forgeryMalicious website exploit where unauthorized commands are transmitted from a trusted user
- Mass assignment vulnerabilityComputer vulnerability
- Evil twin (wireless networks)Method used to facilitate phishing
- Evil twin (wireless networks)Method used to facilitate phishing
- Evil twin (wireless networks)Method used to facilitate phishing
- Session fixationCyberattack allowing one to know another's session identifier