<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Application-Security on Jesus Oseguera</title><link>https://r0tbyt3.dev/tags/application-security/</link><description>Recent content in Application-Security on Jesus Oseguera</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://r0tbyt3.dev/tags/application-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Application Security</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/</guid><description>Application Security Application Security - the practice of identifying and mitigating vulnerabilities in software applications throughout the development lifecycle.
Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks Related Links: Bash Burp Suite Cryptography Cybersecurity Encryption Firewalls Ghidra Hashing Incident Response and Forensics Information Security Models Linux Operating System Malware Analysis Malware Development Network Security Nginx Nmap Obfuscation and Detection Evasion Offensive Phishing Operations Ransomware SOC and Detection Engineering Social Engineering Threat Modeling Windows Security and Administration Wireshark</description></item><item><title>Authentication and Authorization</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/</guid><description>Authentication and Authorization Authentication and Authorization - attack techniques targeting weak authentication mechanisms and improper access control implementations.
Authentication Bypass Techniques Breaking Authentication Breaking Authorization Brute Force vs Password Spraying Related Links: Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Authentication Bypass Techniques</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/authentication-bypass-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/authentication-bypass-techniques/</guid><description>Authentication Bypass Techniques Authentication Bypass Techniques - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Breaking Authentication Breaking Authorization Brute Force vs Password Spraying</description></item><item><title>Automated Exploit Generation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/automated-exploit-generation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/automated-exploit-generation/</guid><description>Automated Exploit Generation Automated Exploit Generation - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Automated Vulnerability Discovery</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/automated-vulnerability-discovery/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/automated-vulnerability-discovery/</guid><description>Automated Vulnerability Discovery Automated Vulnerability Discovery - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Breaking Authentication</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/breaking-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/breaking-authentication/</guid><description>Breaking Authentication Breaking Authentication - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication Bypass Techniques Breaking Authorization Brute Force vs Password Spraying</description></item><item><title>Breaking Authorization</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/breaking-authorization/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/breaking-authorization/</guid><description>Breaking Authorization Breaking Authorization - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication Bypass Techniques Breaking Authentication Brute Force vs Password Spraying</description></item><item><title>Brute Force vs Password Spraying</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/brute-force-vs-password-spraying/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/authentication-and-authorization/brute-force-vs-password-spraying/</guid><description>Brute Force vs Password Spraying Brute Force vs Password Spraying - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication Bypass Techniques Breaking Authentication Breaking Authorization</description></item><item><title>Buffer Overflows</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/buffer-overflows/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/buffer-overflows/</guid><description>Buffer Overflows Buffer Overflows - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: CSRF Directory Traversal SQL Injection Timing Attacks XSS</description></item><item><title>Common Exploit Frameworks and Tools</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/common-exploit-frameworks-and-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/common-exploit-frameworks-and-tools/</guid><description>Common Exploit Frameworks and Tools Common Exploit Frameworks and Tools - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>CSRF</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/csrf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/csrf/</guid><description>CSRF CSRF - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows Directory Traversal SQL Injection Timing Attacks XSS</description></item><item><title>Directory Traversal</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/directory-traversal/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/directory-traversal/</guid><description>Directory Traversal Directory Traversal - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows CSRF SQL Injection Timing Attacks XSS</description></item><item><title>Exploiting Cloud Infrastructure</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-cloud-infrastructure/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-cloud-infrastructure/</guid><description>Exploiting Cloud Infrastructure Exploiting Cloud Infrastructure - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Containerized Environments</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-containerized-environments/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-containerized-environments/</guid><description>Exploiting Containerized Environments Exploiting Containerized Environments - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Embedded Systems</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-embedded-systems/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-embedded-systems/</guid><description>Exploiting Embedded Systems Exploiting Embedded Systems - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Industrial Control Systems (ICS)</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-industrial-control-systems-ics/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-industrial-control-systems-ics/</guid><description>Exploiting Industrial Control Systems (ICS) Exploiting Industrial Control Systems (ICS) - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting IoT Devices</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-iot-devices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-iot-devices/</guid><description>Exploiting IoT Devices Exploiting IoT Devices - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Mobile Devices</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-mobile-devices/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-mobile-devices/</guid><description>Exploiting Mobile Devices Exploiting Mobile Devices - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments</description></item><item><title>Exploiting Operational Technology (OT) Systems</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-operational-technology-ot-systems/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-operational-technology-ot-systems/</guid><description>Exploiting Operational Technology (OT) Systems Exploiting Operational Technology (OT) Systems - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Serverless Environments</description></item><item><title>Exploiting Serverless Environments</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-serverless-environments/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/exploiting-serverless-environments/</guid><description>Exploiting Serverless Environments Exploiting Serverless Environments - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems</description></item><item><title>Injection Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/</guid><description>Injection Attacks Injection Attacks - attack techniques that insert malicious data into an application to alter its execution or query behavior.
Buffer Overflows CSRF Directory Traversal SQL Injection Timing Attacks XSS Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>OWASP Top 10</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/owasp-top-10/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/owasp-top-10/</guid><description>OWASP Top 10 OWASP Top 10 - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Secure Coding Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/secure-coding-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/secure-coding-fundamentals/</guid><description>Secure Coding Fundamentals Secure Coding Fundamentals - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Software Vulnerabilities and Exploits Target-Specific Exploitation Web Based Attacks</description></item><item><title>Software Vulnerabilities and Exploits</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/software-vulnerabilities-and-exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/software-vulnerabilities-and-exploits/</guid><description>Software Vulnerabilities and Exploits Software Vulnerabilities and Exploits - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Target-Specific Exploitation Web Based Attacks</description></item><item><title>SQL Injection</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/sql-injection/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/sql-injection/</guid><description>SQL Injection SQL Injection - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows CSRF Directory Traversal Timing Attacks XSS</description></item><item><title>Target-Specific Exploitation</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/target-specific-exploitation/</guid><description>Target-Specific Exploitation Target-Specific Exploitation - techniques for attacking unique infrastructure and deployment environments beyond standard web applications.
Exploiting Cloud Infrastructure Exploiting Containerized Environments Exploiting Embedded Systems Exploiting Industrial Control Systems (ICS) Exploiting IoT Devices Exploiting Mobile Devices Exploiting Operational Technology (OT) Systems Exploiting Serverless Environments Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Web Based Attacks</description></item><item><title>Timing Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/timing-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/timing-attacks/</guid><description>Timing Attacks Timing Attacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows CSRF Directory Traversal SQL Injection XSS</description></item><item><title>Web Based Attacks</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/web-based-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/web-based-attacks/</guid><description>Web Based Attacks Web Based Attacks - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Authentication and Authorization Automated Exploit Generation Automated Vulnerability Discovery Common Exploit Frameworks and Tools Injection Attacks OWASP Top 10 Secure Coding Fundamentals Software Vulnerabilities and Exploits Target-Specific Exploitation</description></item><item><title>XSS</title><link>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/xss/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/cybersecurity/application-security/injection-attacks/xss/</guid><description>XSS XSS - a cybersecurity concept, technique, or tool relevant to this section of the wiki.
Related Links: Buffer Overflows CSRF Directory Traversal SQL Injection Timing Attacks</description></item></channel></rss>