• About
  • Our Services
  • Our Methodology
    • Attacks & Tests
    • Testing modes
  • Blog

Contact us

Have a question or comment? Submit your message through our contact form and a member of our team will get back to you within 24 hours.

Edit Content

    Blog

    • Home
    • Blog
    • Page 2
    Black Box Testing, Hacking

    Advanced Testing Of Web Application With Custom Message Signing Using Hackvertor (Part #1)

    December 7, 2020 Michael Yermakov No comments yet

    Introduction Many of us have probably been faced with testing an application with custom HTTP request authentication or message signing. The requests from these applications can be proxied but they have built-in replay protection mechanisms in some form. As such, it isn’t possible to resend these requests outside of the application therefore making all external […]

    Hacking

    Firebase Applications – The Untold Attack Surface

    September 14, 2020 AppSec Labs No comments yet

    Introduction In this blogpost, we will review some of the basic components of a Firebase application from a Security Perspective and talk about common issues that don’t get enough attention. What is Firebase? Firebase is a complete backend as a service with many different features that we can plug straight into our applications. For example: There […]

    Hacking

    Understanding the Android clearTextTrafficPermitted Flag

    June 15, 2020 AppSec Labs No comments yet

    Introduction The cleartextTrafficPermitted flag is one of the options in Android’s Network Security Configuration file. The online documentation (https://developer.android.com/training/articles/security-config) explains that from Android 9 (API level 28) and higher, it will be set by default to false and it is intended to prevent insecure communication attempts using clear-text HTTP originating from Android applications. OK, so what does this […]

    Hacking

    A Taxonomy on Brute Force Attacks

    May 8, 2017 AppSec Labs No comments yet

    A brute force attack is a well-known technique of trial and error attempts used by attackers to gain access to unauthorized data. It can be leveraged against servers as an online attack and also against files as a local attack. The common denominator of all these types is that the same pattern is almost always […]

    Posts pagination

    Previous 1 2

    Search

    Categories

    • Black Box Testing (5)
    • Brute Force (5)
    • Code Review (1)
    • Hacking (8)
    • White Box Testing (1)

    Recent posts

    • PHP Security Code Review Cheat Sheet
      PHP Security Code Review Cheat Sheet
    • Still Using SSRF to Take Over Cloud Deployments Once Again
      Still Using SSRF to Take Over Cloud Deployments Once Again
    • ReDoS

    AppSec Labs offer rapid, modern security penetration testing, utilizing smart solutions to protect against evolving cyber threats.

    Features
    • Home
    Resources
    • Blog
    Company
    • About us
    Get in touch
    • info@appsec-labs.com

    © AppSec Labs 2024. All Rights Reserved.

    • Terms & Conditions
    • Privacy Policy