Tag

Defense Techniques

0 views collected around this technical thread.

System Architect Go
System Architect Go
Mar 2, 2021 · Information Security

OS Command Injection

This article explains what OS command injection is, how it can be detected and exploited on both Linux and Windows systems, demonstrates common payloads and techniques—including blind and out‑of‑band methods—and provides best‑practice defenses to prevent such vulnerabilities.

Defense TechniquesOS command injectionshell injection
0 likes · 10 min read
OS Command Injection
Architect
Architect
Jan 19, 2016 · Information Security

100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook

The article presents a comprehensive list of one hundred concrete web‑application security techniques—ranging from HTTP request analysis and token validation to WAF rule conversion, honeypot deployment, IP reputation checks, and response‑time monitoring—derived from the book “Web Application Defender's Cookbook” and illustrated with real‑world examples and tool references.

Defense TechniquesModSecuritysecurity operations
0 likes · 16 min read
100 Practical Web Application Defense Techniques from the Web Application Defender's Cookbook