What Are Email Injection Attacks

It is common practice for web pages and web applications to implement contact forms, which in turn send email messages to the intended recipients. Most of the time, such contact forms set headers. These headers are interpreted by the email library on the web server…

Read more

VIDEO: Acunetix Login Sequence Recorder

The Acunetix Login Sequence Recorder can be used to test password-protected areas of your website automatically. In order to scan a form-based password protected area, you will need to make use of a Login Sequence during the scan. The Login Sequence can be configured from…

Read more

What is a Host Header Attack?

It is common practice for the same web server to host several websites or web applications on the same IP address. This why the host header exists. The host header specifies which website or web application should process an incoming HTTP request. The web server…

Read more