XSS Filter Evasion Basics

The two primary methods of avoiding Cross-site Scripting (XSS) vulnerabilities are XSS filtering and XSS escaping. However, XSS filtering is not recommended because it can usually be evaded using clever tricks. Here are some of the methods that an attacker can employ in their malicious…

Read More →

How to Use Allowed Hosts

When you build web applications, you often use multiple back-end web services to interface between client-side and server-side applications. For example, enterprises use functional subdomains to distribute static content or application logic between API requests. To scan the entire web application, the web vulnerability scanner…

Read More →

What Is Cookie Poisoning

The term cookie poisoning is used in different contexts to describe attacks that aim to manipulate, intercept, or forge the content of HTTP cookies. Cookie poisoning attacks are different types of attacks that can affect both the client-side application, data transmission, or the web server….

Read More →

Visit Us at RSA Conference 2020

Acunetix will be exhibiting at the RSA Conference 2020 on February 24–28 in San Francisco. Join us at booth #6365 in the North Expo to find out about the latest automated features of Acunetix, the leader in web application security scanning. You can click here…

Read More →