System Architect Go
Author

System Architect Go

Programming, architecture, application development, message queues, middleware, databases, containerization, big data, image processing, machine learning, AI, personal growth.

175
Articles
0
Likes
324
Views
0
Comments
Recent Articles

Latest from System Architect Go

100 recent articles max
System Architect Go
System Architect Go
Mar 10, 2021 · Information Security

Server-side Template Injection

This article explains what server‑side template injection (SSTI) is, how it arises, its potential impacts such as remote code execution, methods for detecting, identifying and exploiting vulnerable template engines, and best‑practice mitigation techniques to prevent these critical web security flaws.

0 likes · 14 min read
Server-side Template Injection
System Architect Go
System Architect Go
Mar 8, 2021 · Information Security

Insecure Deserialization

This article explains what insecure deserialization is, why it leads to high‑severity attacks, demonstrates typical PHP, Ruby, and Java examples, and provides practical techniques for identifying, exploiting, and mitigating unsafe deserialization vulnerabilities.

DeserializationExploitJava
0 likes · 27 min read
Insecure Deserialization
System Architect Go
System Architect Go
Mar 6, 2021 · Information Security

Understanding and Exploiting HTTP Host Header Attacks

This article explains how misconfigured HTTP Host headers can be abused for attacks such as cache poisoning, SSRF, password‑reset poisoning and other server‑side exploits, and provides practical detection methods and defensive recommendations for developers and security engineers.

HTTPPassword ResetSSRF
0 likes · 26 min read
Understanding and Exploiting HTTP Host Header Attacks
System Architect Go
System Architect Go
Mar 4, 2021 · Information Security

Understanding Clickjacking: Attack Techniques and Effective Defenses

This article explains what clickjacking (UI redressing) is, demonstrates how attackers craft hidden iframe layers to hijack user clicks, and outlines both client‑side and server‑side mitigation strategies such as frame‑busting scripts, X‑Frame‑Options, and Content‑Security‑Policy directives.

Content Security PolicyUI redressingX-Frame-Options
0 likes · 10 min read
Understanding Clickjacking: Attack Techniques and Effective Defenses
System Architect Go
System Architect Go
Mar 3, 2021 · Information Security

HTTP Request Smuggling

This article explains what HTTP request smuggling is, how the vulnerability arises from conflicting Content‑Length and Transfer‑Encoding headers, describes common CL.TE, TE.CL and TE.TE attack patterns, and outlines detection techniques and defensive measures for modern web infrastructures.

AttackHTTPRequest Smuggling
0 likes · 29 min read
HTTP Request Smuggling
System Architect Go
System Architect Go
Mar 2, 2021 · Information Security

OS Command Injection

This article explains what OS command injection is, how it can be detected and exploited on both Linux and Windows systems, demonstrates common payloads and techniques—including blind and out‑of‑band methods—and provides best‑practice defenses to prevent such vulnerabilities.

OS command injectiondefense techniquesshell injection
0 likes · 10 min read
OS Command Injection
System Architect Go
System Architect Go
Mar 1, 2021 · Information Security

Server-side Request Forgery (SSRF)

This article explains what server‑side request forgery (SSRF) is, describes its impact, common attack vectors such as targeting the server itself or internal services, outlines bypass techniques for blacklist and whitelist filters, and discusses blind SSRF detection using out‑of‑band methods.

Information SecuritySSRFout‑of‑band
0 likes · 12 min read
Server-side Request Forgery (SSRF)
System Architect Go
System Architect Go
Mar 1, 2021 · Information Security

How Attackers Exploit Directory Traversal and How to Defend Against It

This article explains what directory (path) traversal is, demonstrates how attackers can read or write arbitrary files on a server by manipulating file‑path parameters, outlines common bypass techniques, and provides concrete defensive coding practices to mitigate the vulnerability.

Vulnerabilitydefensedirectory traversal
0 likes · 6 min read
How Attackers Exploit Directory Traversal and How to Defend Against It