How to hack #4 – XML External Entity Processing

Introduction Today, we use XML files over JSON because of old, legacy applications which support communication only using XML files (for example SOAP) or because the XML Schema which is much more adult than JSON Schema or Swagger. Or you like XML or… you use Java! Anyway, regardless of the reason for your decision using this Read more about How to hack #4 – XML External Entity Processing[…]

How to hack #1 – SQLInjection


Security becomes more and more important. Clients will not use our products if they will not trust us. On the other hand, sensitive data are a tasty morsel for attackers who can try use this data to grant access to another website or use them for phishing and so on. In this article I will tell you about using this kind of vulnerabilities. […]