How to hack #4 – XML External Entity Processing

XML files are still very popular this days. Do you know how dangerous can be processing this kind of files?

How to hack #3 – Clickjacking

What is clickjacking? How to does it work? In this post, I'll show you an example of the attack.

How to hack #2 – Cross Site Scripting

What clickjacking is? How to does it work? In this post I'll show you an example of the attack.

How to hack #1 – SQL Injection

SQL injection is one of the most popular vectors of attacks. Do you want to know how it works and how to protect against it?