Resources

Application Security  |  Blog

Common Vulnerabilities In Web Apps: SQL Injection

Web Application Risks: SQL Injection Welcome to the second of five posts on the top vulnerabilities ...

Application Security  |  Blog

Common Vulnerabilities in Web Apps: Broken Authentication

Web Application Risks: Broken Authentication Welcome to the first of five posts addressing the typic...

Application Security

XSS Post #2: Event Handlers & Breaking Out

Following on from my first blog post, hopefully you’ve now grasped the basics of XSS, so we can mo...

Application Security

MySQL SQL Injection Practical Cheat Sheet

There are lot of excellent SQL injection cheat sheets out there; however, I found the majority provi...

Application Security

Real World XSS Attacks #2: Iframe Credential Harvesting

Continuing on from my previous post where we took a look at the key JavaScript functions needed to...

Application Security

Real World XSS Attacks #1: Introduction & Key JavaScript Principles

When encountering a Cross-Site Scripting (XSS) flaw, it is standard practice for a penetration teste...

Application Security

Introduction & XSS Post #1: The Basics

Hello and welcome to the new Perspective Risk blog! I thought I’d begin with a series of posts on...