Learning Centre
Securing your web application shouldn't take up all of your spare time, we've put together a number of learning guides to help you get your head around the potential security holes which may effect your application. Ranked from low to critical these guides should give you a basic understanding of various web application vulnerabilities.
Guide to web application firewalls
Stopping malicious requests before they reach your website is a step in the right direction.
SQL Injection
Protect your website infrastructure by ensuring SQL injection cannot happen to you.
Cross Site Scripting
Execution of foreign code can leave your website at risk, you have the power to stop this.
Command Execution
The operating system is sacred, stop allowing users from accessing its internals.
Secure Authentication
Taking care with authentication is a must do to ensure users are kept safe.
Unvalided Redirects
Simply redirecting users should never be overlooked, never trust input.
Remote File Inclusion
Including executable remote files can hold catastrophic conse
Security Headers
Popular security headers can help protect against a number of vulnerabilities.
Full Path Disclosure
Simply knowing a website layout can help an attcker gain access and find hidden files.
Server-side
Request Forgery
Access to network restricted systems can be dangerous.
Local File Inclusion
Including user controlled files can be dangerous, who knows whan they could find.
Host Header
Injection
Unsanitized host headers can lead to compromised accounts, never trust input.
Server-side
Template Injection
Execution of server-side code can leave the full application at risk.