Blueinfy's blog

Pages

  • Home
  • Authored Books
  • Presentations
  • Papers/Articles
  • lambdaScanner
  • AI/ML Security
  • Case Studies

Presentations


XSS and CSRF with HTML5 from Shreeraj Shah

FIND ME IF YOU CAN – SMART FUZZING AND DISCOVERY from Shreeraj Shah

HTML5 Top 10 Threats - Silent Attacks and Stealth Exploits from Shreeraj Shah

Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) from Shreeraj Shah

Web Attacks - Top threats - 2010 from Shreeraj Shah

Secure SDLC for Software from Shreeraj Shah

[Infosecworld 08 Orlando] CSRF: The Biggest Little Vulnerability on the Web from Shreeraj Shah

[Infosecworld 08 Orlando] New Defenses for .NET Web Apps: IHttpModule in Practice from Shreeraj Shah

Web 2.0 Application Kung-Fu - Securing Ajax & Web Services from Shreeraj Shah

AppSec 2007 - .NET Web Services Hacking from Shreeraj Shah
Home
Subscribe to: Posts (Atom)

About us

Blueinfy specializes in application security with a clear strategic focus. We provide products and services to evaluate and improve the overall security posture of enterprise applications, websites and software deployed worldwide. We continually strive to ensure complete security of our clients' applications and software assets, and to achieve this through state-of-the-art know-how built by enhancing methodologies, evolving tools and researching technologies. [Explore us]

Knowledge based and Tools

This blog is created to share our knowledge base with the industry.



Blog Archive

  • ▼  2024 (19)
    • ▼  December (1)
      • Unauthorized Data Access using Azure SAS URLs serv...
    • ►  November (1)
    • ►  October (1)
    • ►  September (3)
    • ►  August (4)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  May (4)
    • ►  April (3)
  • ►  2021 (3)
    • ►  October (2)
    • ►  March (1)
  • ►  2020 (3)
    • ►  September (1)
    • ►  August (1)
    • ►  June (1)
  • ►  2019 (3)
    • ►  June (1)
    • ►  February (2)
  • ►  2018 (17)
    • ►  December (1)
    • ►  November (1)
    • ►  October (4)
    • ►  September (4)
    • ►  August (3)
    • ►  July (3)
    • ►  January (1)
  • ►  2017 (10)
    • ►  December (3)
    • ►  November (2)
    • ►  September (2)
    • ►  July (1)
    • ►  April (1)
    • ►  February (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  September (2)
    • ►  April (1)
  • ►  2014 (6)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (2)
    • ►  January (1)
  • ►  2013 (5)
    • ►  December (1)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (12)
    • ►  December (4)
    • ►  November (1)
    • ►  September (1)
    • ►  August (2)
    • ►  February (1)
    • ►  January (3)
  • ►  2011 (7)
    • ►  December (4)
    • ►  November (1)
    • ►  March (2)
  • ►  2010 (5)
    • ►  September (2)
    • ►  April (2)
    • ►  February (1)
  • ►  2009 (19)
    • ►  October (3)
    • ►  September (6)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2008 (13)
    • ►  November (1)
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  June (2)
    • ►  May (1)
    • ►  March (5)
    • ►  February (1)
  • ►  2007 (13)
    • ►  December (5)
    • ►  November (1)
    • ►  October (4)
    • ►  September (2)
    • ►  August (1)

Labels

HTML5 serverless [Case Study] AI/ML Penetration testing lambda SAST aws CORS CSRF DAST DOM based XSS Security Controls Advanced Architecture Ajax JSON XHR Cloud DOM injection SSRF Validations XSS code review prompt injection Attack Surface Authentication Cookie replay File System API LLM Applications Methodology Upload WebSQL WebSocket mobile API Advisory Amish Shah Authorization Business Logic CORJacking Crypto Defense Double eval() Error Handling Exceptions FileAPIs Filter IAST Injections JSON Hijacking REST RIA Security Regex Response tampering SDLC SOP SameSite Session Management Storage Struts Threats WAF XML local storage prompt leakage salesforce

Search This Blog

(c) Blueinfy Solutions. Simple theme. Powered by Blogger.