How to hack #4 – XML External Entity Processing
XML files are still very popular this days. Do you know how dangerous can be processing this kind of files?
How to hack #3 – Clickjacking
What is clickjacking? How to does it work? In this post, I'll show you an example of the attack.
How to hack #2 – Cross Site Scripting
What clickjacking is? How to does it work? In this post I'll show you an example of the attack.
How to hack #1 – SQL Injection
SQL injection is one of the most popular vectors of attacks. Do you want to know how it works and how to protect against it?