Learning Centre

Securing your web application shouldn't take up all of your spare time, we've put together a number of learning guides to help you get your head around the potential security holes which may effect your application. Ranked from low to critical these guides should give you a basic understanding of various web application vulnerabilities.

Guide to web application firewalls

Stopping malicious requests before they reach your website is a step in the right direction.

Information Piece

SQL Injection

Protect your website infrastructure by ensuring SQL injection cannot happen to you.

Risk Level: Critical

Cross Site Scripting

Execution of foreign code can leave your website at risk, you have the power to stop this.

Risk Level: Medium

Command Execution

The operating system is sacred, stop allowing users from accessing its internals.

Risk Level: Critical

Secure Authentication

Taking care with authentication is a must do to ensure users are kept safe.

Information Piece

Unvalided Redirects

Simply redirecting users should never be overlooked, never trust input.

Risk Level: medium

Remote File Inclusion

Including executable remote files can hold catastrophic conse

Risk Level: Critical

Security Headers

Popular security headers can help protect against a number of vulnerabilities.

Information Piece

Full Path Disclosure

Simply knowing a website layout can help an attcker gain access and find hidden files.

Risk Level: Low

Server-side
Request Forgery

Access to network restricted systems can be dangerous.

Risk Level: Critical

Local File Inclusion

Including user controlled files can be dangerous, who knows whan they could find.

Risk Level: Medium

Host Header
Injection

Unsanitized host headers can lead to compromised accounts, never trust input.

Risk Level: medium

Server-side
Template Injection

Execution of server-side code can leave the full application at risk.

Risk Level: Critical

File Upload
Vulnerabilities

Overlooking simple steps can lead to disaster.

Information Piece