David Checa´s Blog

Special Weapons And Tactics For Net Developers

Primary Menu

  • My Resume
Search

Site banner

Special Weapons And Tactics For Net Developers

Front page sidebar

Categories

Latest Posts

  • OWASP TOP 4: Xml External Entities (XEE)
  • OWASP TOP 3: Sensitive Data Exposure Basics
  • OWASP TOP 2: Broken Authentication and Session Management Basics
  • OWASP TOP 1: Injection – Basics
  • Web Application Security: OWASP TOP 10

Pages

  • My Resume

OWASP TOP 4: Xml External Entities (XEE)

This is the fifth article in the OWASP Top 10 Series Overview…

Continue reading “OWASP TOP 4: Xml External Entities (XEE)”…
Posted on: 29 Jun 2019 Written by: David Checa Comments: Comments: 0

OWASP TOP 3: Sensitive Data Exposure Basics

This is the fourth article in the OWASP Top 10 Series Overview…

Continue reading “OWASP TOP 3: Sensitive Data Exposure Basics”…
Posted on: 21 Jun 2019 Written by: David Checa Comments: Comments: 0

OWASP TOP 2: Broken Authentication and Session Management Basics

This is the third article in the OWASP Top 10 Series Overview…

Continue reading “OWASP TOP 2: Broken Authentication and Session Management Basics”…
Posted on: 14 Jun 2019 Written by: David Checa Comments: Comments: 0

OWASP TOP 1: Injection – Basics

This is the second article in the OWASP Top 10 Series INTRO…

Continue reading “OWASP TOP 1: Injection – Basics”…
Posted on: 19 May 2019 Written by: David Checa Comments: Comments: 0

Web Application Security: OWASP TOP 10

This is the first of a series of articles related to OWASP…

Continue reading “Web Application Security: OWASP TOP 10”…
Posted on: 8 May 2019 Written by: David Checa Comments: Comments: 0

Mono.Cecil (Part II): Basic Operations

INTRO In this second article I´ll try to ilustrate some of the…

Continue reading “Mono.Cecil (Part II): Basic Operations”…
Posted on: 18 Apr 2019 Written by: David Checa

Mono.Cecil (Part I): Overview

This is the first of a series of articles related to Mono.Cecil…

Continue reading “Mono.Cecil (Part I): Overview”…
Posted on: 18 Apr 2019 Written by: David Checa

Metaprogramming: Overview

INTRO Under this topic we are going to review a set of…

Continue reading “Metaprogramming: Overview”…
Posted on: 18 Apr 2019 Written by: David Checa

Roslyn & You (Part III) : Playing with Syntax Trees

Now we have reviewed the basics of Roslyn it´s time to starting…

Continue reading “Roslyn & You (Part III) : Playing with Syntax Trees”…
Posted on: 2 Nov 2018 Written by: David Checa

Posts Navigation

1 2 3 Next page »

Footer sidebar

Tags

.NET ThreadPool AppDomains Application Security Broekn Authentication CLR CLR-Threading CodeDOM Command Injection DLR DSL Dynamic C# Garbage Collector HTST LDAP Injection Metaprogramming mono.cecil OWASP Top 4 OWASP TOP 10 OWASP Top Ten Reflection Reflection Injection Roslyn Sensitive Data Exposure Session Hijacking Session Management SQL Injection SSL Strong Hashing Syntax Nodes Syntax Trees T4 TLS Trivial Node Uncategorised WCF Weak Encryption Xml External Entities XPath Injection XXE
© 2023 David Checa´s Blog | Using Auberge WordPress theme. | Back to top ↑