Looking past layer 7

When it comes to Web security why is it we always seem to focus on layer 7 only? Sure, it can be argued that XSS, SQL injection, flawed application logic and so on are the big deal items in any given Web system. But who…

Read more

Statistics from the top 1,000,000 websites

Note: This article refers to an older version of Acunetix. Click here to download the latest version. The next version of Acunetix Web Vulnerability Scanner (version 7), will contain a much more improved HTTP stack.   While testing, we wanted to test the new HTTP stack…

Read more

Rockyou gets rocked by hackers and old exploit

Well, it has happened. This time, the users themselves have taken action against rockyou.com for their inadvertent disclosure of customer information.  Hacker activity has meant Rockyou disclosed what looks like over 32,000,000 accounts. Yes, 32 Million! What is interesting about this case, for me anyways,…

Read more

An In-Depth Look at SQL Injection

SQL injection attacks are one of the most common techniques hackers use to access secure information from web servers to carry out illegitimate activities.  This hacking technique also demonstrates how vulnerable systems are on not just the insecure ports and other firewall protected fronts, but…

Read more

Statistics from 10,000 leaked Hotmail passwords

An anonymous user posted usernames and passwords for over 10,000 Windows Live Hotmail accounts to web site PasteBin. PasteBin is currently down for maintenance but I managed to get a copy of the list and quickly generated some statistics from these passwords. First, my impression…

Read more