One of the fundamental security vulnerabilities that exist among many of the popular flavors of exploits such as XSS and SQL Injection, as well as many others, is the lack of input validation. Web applications that check... if client input is valid and usable by the application for which it was designed, have taken the first and probably the most effective step in securing their web application. We will attempt to familiarize the reader in this tutorial on how to tamper with and exploit parameters that could lack of input validation.

Read More

The link for this article located at https://securitydistro.com is no longer available.