Security Insight

SERVICE – INADEQUATE PERMISSION VALIDATION

Vulnerability examples   Inadequate authorization checks gaps/weaknesses that allow unauthorized users to view, modify, or delete sensitive information without going through a valid authentication process when submitting a request to a website. For example, when you edit an article on an ad, the following HTTP request is sent. The website creates a unique profile for each […]

SERVICE – INADEQUATE PERMISSION VALIDATION 더 읽기"

ENCRYPTING SENSITIVE DATA WITH THE SERVER`S HTTPS PUBLIC KEY

   How to implement data encryption with the server’s public key on a website that provides HTTPS?     Occasionally, when diagnosing mock hacking on a mobile app or website, there are cases in which the data is encrypted with a random symmetric key method and transmitted to the server without encrypting the data using the

ENCRYPTING SENSITIVE DATA WITH THE SERVER`S HTTPS PUBLIC KEY 더 읽기"

SQL INJECTION IN CMS

Vulnerability Examples   SQL injection is an attack technique in which an attacker exploits security vulnerabilities toinject and execute arbitrary SQL statements, thereby manipulating the database to performabnormal operations. There are attack types such as Error SQL Injection, Blind SQLInjection, and Union based SQL Injection.    For example, in the code in the figure below, the

SQL INJECTION IN CMS 더 읽기"

OVERFLOW IN APPLICATION

Vulnerability Examples:   An overflow vulnerability occurs when a program that uses contiguous memory space triesto read or write data to a location beyond the allocated memory range. By causing programmalfunction or executing malicious code, an attacker gains the authority to control theprogram.   Most of the vulnerabilities are caused by copying into memory without verifying the

OVERFLOW IN APPLICATION 더 읽기"

COMMAND INJECTION IN APPLICATION

Vulnerability Examples:    Command Injection is a vulnerability in which unintentional system commands are executed by user input values that have not undergone proper verification procedures, which can inappropriately change user privileges or adversely affect system operation and operation.    For example, when the program is executed as shown in figure below, a specific string

COMMAND INJECTION IN APPLICATION 더 읽기"

HOW TO STRATEGICALLY PREPARATE THE DPP LAW

Understanding The DPP Law     In the digital age, data protection has become a paramount concern for both businesses and individuals. Rwanda, cognizant of these shifting paradigms, introduced the Data Protection and Privacy (DPP) Law, setting standards and guidelines for businesses operating within its jurisdiction. Ensuring compliance with this comprehensive regulation is not just a

HOW TO STRATEGICALLY PREPARATE THE DPP LAW 더 읽기"