- Find among several classes of technical vulnerabilities, such as those enumerated in the OWASP top ten and SANS CWE 25
- Present vulnerabilities and define them as the potential to either gain unauthorized access or extract sensitive data to a target system
- Curate an assessment of the impact and suggest a proposal for mitigation or a technical solution
A good assessment covers:
HTML Injection and Cross-Site Scripting (XSS) Often misunderstood by security firms, HTML injection impacts the DOM structure where data and code mix in undesirable ways.
Cross-site Request Forgery (CSRF) This attack forces the browser into initiating a request without the victims knowledge.
SQL Injection and Data store manipulation SQLi is easier to defend against than HTMLi but here, the attacker manipulates commands between the app and the db.
Authentication Schemes An attacker can either use pilfered passwords or bypass the authentication check in interesting ways.
Design Defincies Here obscure attacks such as TOCTOU and other race conditions and logic flow vulnerabilities, often overlooked by security firms proliferate.
Platform weakness Well implemented apps become compromised by architecture flaws the app runs on.
Browser & Privacy Attacks Fingerprinting and other privacy misuse and ways a website attacks the browser.
Copyright 2025 Oxytis Forensics LLC. All Rights Reserved. Privacy Policy