Resources

MySQL SQL Injection Practical Cheat Sheet
Application Security

MySQL SQL Injection Practical Cheat Sheet

There are lot of excellent SQL injection cheat sheets out there; however, I found the majority provi...

Common Vulnerabilities In Web Apps: SQL Injection
Application Security  |  Blog

Common Vulnerabilities In Web Apps: SQL Injection

Web Application Risks: SQL Injection Welcome to the second of five posts on the top vulnerabilities ...

Common Vulnerabilities in Web Apps: Broken Authentication
Application Security  |  Blog

Common Vulnerabilities in Web Apps: Broken Authentication

Web Application Risks: Broken Authentication Welcome to the first of five posts addressing the typic...

XSS Post #2: Event Handlers & Breaking Out
Application Security

XSS Post #2: Event Handlers & Breaking Out

Following on from my first blog post, hopefully you’ve now grasped the basics of XSS, so we can mo...

Real World XSS Attacks #2: Iframe Credential Harvesting
Application Security

Real World XSS Attacks #2: Iframe Credential Harvesting

Continuing on from my previous post where we took a look at the key JavaScript functions needed to...

Real World XSS Attacks #1: Introduction & Key JavaScript Principles
Application Security

Real World XSS Attacks #1: Introduction & Key JavaScript Principles

When encountering a Cross-Site Scripting (XSS) flaw, it is standard practice for a penetration teste...

Introduction & XSS Post #1: The Basics
Application Security

Introduction & XSS Post #1: The Basics

Hello and welcome to the new Perspective Risk blog! I thought I’d begin with a series of posts on...