Skip to content

Cybersecurity, etc.

Pentesting and red teaming topics

  • Home
  • Pentesting
  • Red Team
  • Web
  • Contact

Category: Web

JSON Input Validation – Why?

November 5, 2025November 5, 20250

1. Security vulnerabilities a. Injection attacks Example: If used directly in an SQL string without sanitization, this could bypass authentication. b. Deserialization attacks Example:If your… JSON Input Validation – Why?Read more

CSRF Demystified

March 19, 2025March 23, 20250

1. What is CSRF? Cross-Site Request Forgery (CSRF) is a web security vulnerability where an attacker tricks an authenticated user into unknowingly executing unwanted actions… CSRF DemystifiedRead more

HttpOnly & Secure HTTP Headers

March 12, 2025March 23, 20250

The HttpOnly and Secure flags are security attributes that can be set on cookies in HTTP response headers to enhance web application security. They help… HttpOnly & Secure HTTP HeadersRead more

XSS – What’s the worst-case scenario?

March 10, 2025March 23, 20250

Cross-Site Scripting (XSS) is often underestimated, but in real-world attacks, it can lead to complete account takeover, data theft, malware injection, and even full system… XSS – What’s the worst-case scenario?Read more

Recent posts

  • JSON Input Validation – Why?
  • What’s a DMZ?
  • Encryption – Symmetric vs. Asymmetric
  • Credential Stuffing vs. Password Spraying
  • CSRF Demystified

Useful links

  • Rogue Labs
  • Sektor7
  • Web Security Academy
  • RedSeer Security

about racrx

Let's talk about all things cybersecurity - web/network pentesting and red teaming.

Categories

  • Misc. Security
  • Pentesting
  • Red Team
  • Web
- 2025 -
Powered by electricity | Theme: Apace by ThemezHut.