Skip to content
Affinity IT Security
  • Cybersecurity Assessments
  • Compliance
  • Training
  • About
  • Contact
  • Articles

OUTSOURCE YOUR CYBERSECURITY

Increase security. Maintain compliance. Retain control.

Find Out How
Find and Fix Your Vulnerabilities.  Discretely. Now Find and Fix Your Vulnerabilities.  Discretely. Now

How To Test For … ?

How To Test For Command Injection

March 4, 2017January 8, 2018 JoeHow To Test For ... ?, Web Application Vulnerabilities
Testing For Command Injection

If you are not already familiar with the concept of Command Injection, we suggest that you review the article entitled “What Is Command Injection ?“. Detecting Command Injection Since it is usually not obvious which, if any, inputs might influence […]

Read more

How To Test For Privilege Escalation

March 1, 2017January 8, 2018 JoeHow To Test For ... ?, Web Application Vulnerabilities
Testing For Privilege Escalation

If you are not already familiar with the concept of Privilege Escalation, we suggest that you review the article entitled “What Is Privilege Escalation ?“. Detecting Privilege Escalation The first step in determining whether an application contains Privilege Escalation vulnerabilities […]

Read more

How To Test For Insecure Direct Object References

February 26, 2017January 8, 2018 JoeHow To Test For ... ?, Web Application Vulnerabilities
Testing For Insecure Direct Object References

If you do not already have an understanding of Insecure Direct Object References, we suggest that you review the article entitled “What Is An Insecure Direct Object Reference ?“. Detecting Insecure Direct Object References Testing for Insecure Direct Object References […]

Read more

How To Test For Open Redirects

February 19, 2017January 8, 2018 JoeHow To Test For ... ?, Web Application Vulnerabilities
Testing For Open Redirects

If you are not already familiar with the concept of “Open Redirect” and “Open Forward”, we would suggest that you review “What Is An Open Redirect ?“. Detecting Open Redirects Manually detecting Open Redirect vulnerabilities involves making a careful examination […]

Read more

How To Test for Path Traversal

February 17, 2017January 8, 2018 JoeHow To Test For ... ?, Web Application Vulnerabilities
Testing For Path Traversal

If you are not already familiar with what a Path Traversal vulnerability is, we suggest that you review the article entitled: “What Is Path Traversal ?“. Detecting Path Traversal Detecting Path Traversal is quite straightforward and simply entails providing malicious […]

Read more

Posts navigation

Older posts
Newer posts

Recent Posts

  • Affinity IT Security Services Has New Focus on Critical Infrastructure Protection
  • Designing Secure API Services
  • On Complexity, Convenience, Risk, and Privacy
  • A Strategy for Successfully Hiring Experienced Penetration Testing Staff
  • Measuring Phishing Risk
  • Securing IoT Networks: Security Configuration and Capacity

Categories

  • 1O Things …
  • How To Prevent … ?
  • How To Test For … ?
  • Press Releases
  • Reasons Why…
  • Uncategorized
  • Web Application Vulnerabilities
  • What Is … ?

Cybersecurity is more critical than ever before. You need a partner with the right expertise.

Find and fix your vulnerabilities. Do it discreetly. Do it now.

Find and Fix Your Vulnerabilities. Discretely. Now

1243 Sussex Turnpike Suite #1, Randolph, NJ 07869
info@Affinity-IT.com
800.840.2335
  • 23 NYCRR 500 Compliance
  • About Us
  • Affinity IT Security
  • Application Security Testing
  • Articles
  • Be a Professional Hacker
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Certified Ethical Hacker (CEH)
  • Become a Penetration Tester
  • Best Hacker School
  • Best Hacking School
  • CEH Bootcamp
  • CEH Certification
  • CEH Exam
  • CEH Exam Preparation
  • CEH Instruction
  • Certified Ethical Hacker (CEH) Exam
  • Certified Ethical Hacker (CEH) Training Class
  • Choose the RIGHT Cybersecurity Partner
  • Contact Us
  • Cybersecurity Compliance
  • Cybersecurity Compliance Inquiry
  • EC Council CEH Accredited Training Center
  • Ethical Hacker Course
  • Ethical Hacker Course
  • Ethical Hacking Course
  • Getting Your CEH
  • Hacker Bootcamp
  • Hacker Training
  • HIPAA Compliance
  • Information Security Assessments and Penetration Tests
  • Information Security Training Inquiry
  • Learn Ethical Hacking
  • Learn Penetration Testing
  • Learn PenTesting
  • Network Security Testing
  • Network Vulnerability Assessment
  • PCI DSS Compliance
  • Penetration Test Training
  • Penetration Testing and Vulnerability Assessments Inquiry
  • Penetration Testing Bootcamp
  • Penetration Testing Course
  • Penetration Testing School
  • Pentesting Bootcamp
  • Pentesting Course
  • Pentesting School
  • Prepare For The CEH Test
  • Training
  • Training Course: Application Security and the SDLC
  • Training Course: Designing Secure Web Applications
  • Training Course: Employee IT Security Awareness
  • Training Course: Fundamentals of IT Security
  • Training Course: Gathering and Documenting Web Application Security Requirements
  • Training Course: Testing Web Application Security
  • Training Course: Understanding HIPAA Security Compliance
  • Training Course: Understanding NERC-CIP
  • Training Course: Understanding PCI-DSS
  • Website Security Testing
  • Website Vulnerability Assessment
  • What Cybersecurity Services Do You Actually Need ?
Powered by WordPress | Theme: Astrid by aThemes.