Protected: Exploiting the Avenue PoC

Justin Bess :: June 15, 2018

There is no excerpt because this is a protected post.

read more...

Implementing XSRF Tokens

Justin Bess :: June 5, 2018

Explaining XSRF XSRF is a malicious attack, in which an unauthorized action is taken on behalf of a client, and the server trusts that command, as if it was authenticated. There are a number of possible ways that an attacker could hijack your session and attempt to make requests on your behalf. Some exploits may […]

read more...

Bypassing SOP

Justin Bess :: May 31, 2018

So, you need to bypass same origin policy… Before we begin, if you find yourself asking what SOP (same origin policy) is, then this blog post is not for you. This blog post will cover some of the techniques that can be used to bypass the security standard, not what it is. Consider reading the […]

read more...