• Home
  • Security
    • Coding vulnerabilities
    • Freelance Scams
    • General Security
    • Phishing
    • Scam Emails
    • Secure coding
    • Security News
    • Social Engineering
  • Gaming
    • Gaming News
  • Technical Analysis
  • Writing Services
    • Technical Writing
    • Content Strategy
  • SEO and GEO Marketing
  • Contact
Pinkhat Code
  • Home
  • Security
    • Coding vulnerabilities
    • Freelance Scams
    • General Security
    • Phishing
    • Scam Emails
    • Secure coding
    • Security News
    • Social Engineering
  • Gaming
    • Gaming News
  • Technical Analysis
  • Writing Services
    • Technical Writing
    • Content Strategy
  • SEO and GEO Marketing
  • Contact
s

ssl-azure-marketplace

October 24, 2018 0 0

Published in:

Post navigation

How to Set Up an SSL Certificate on an Azure IIS VM Without Powershell

Share Article:

jennifer

As a writer with 15 years of experience helping brands grow their visibility online, I provide content with proven success for many small businesses and large enterprises. I've helped numerous companies improve traffic to their sites including Microsoft, Pure Storage, Adobe, Rackspace, CloudLinux, SolarWinds, IBM and several more. I've had content featured in TechCrunch and FastCompany. I've also ghostwritten technical books for O'Reilly. Contact me to see what I can do for you at [email protected]. See my portfolio here: https://www.clippings.me/jennm.

View All Articles

Leave a Reply Cancel reply

Related Articles

React2Shell Security Patch and CVE-2025-55182 Explained

December 6, 2025

CVE-2025-8489 Explanation: How a Mistake in a WordPress Hook Function Lets Attackers Gain Administrator Access

December 5, 2025

A Developer Guide to Performing a TLS Handshake

June 5, 2022

Using Python to Find Firebase Storage Security Misconfigurations Hardcoded in Repositories

April 25, 2022

Recent posts

React2Shell Security Patch and CVE-2025-55182 Explained

December 6, 2025

CVE-2025-8489 Explanation: How a Mistake in a WordPress Hook Function Lets Attackers Gain Administrator Access

December 5, 2025

A Developer Guide to Performing a TLS Handshake

June 5, 2022

Using Python to Find Firebase Storage Security Misconfigurations Hardcoded in Repositories

April 25, 2022

Cozy Nerd Books

Title: The OWASP Top 10 Handbook: Hacking Broken Access Controls (with practical examples and code)

Summary: Buy this book on Amazon. The OWASP Top 10 is a categorization of common vulnerabilities affecting applications. This book covers category one: broken access controls. Broken access controls is an umbrella category for several different ways hackers can gain control over accounts and applications using mistakes in authentication and authorization. You might think that you have authentication locked down in your application or API, but hackers often find bugs to bypass controls. Broken access controls are usually minor mistakes with huge consequences, and this book provides developers and application owners with basic examples to help them find their own vulnerabilities. This book offers real-world examples and code to show developers or application owners how hackers gain access to accounts or unauthorized data using exploits on broken access controls. Python code is used in real-world example scenarios to test applications for common vulnerabilities, so developers can grasp the ease at which some broken access controls can be hacked. Application owners will get a better understanding of cybersecurity issues and the importance of hardened source code. All Python scripts are published on Github publicly for your convenience. The ebook has seven chapters: Introduction: A breakdown of several broken access control subcategories and an understanding of the OWASP Top 10. Chapter 1 (Principle of Least Privilege): If you’re designing an application or need to create authorization rules, the Principle of Least Privilege is covered in this chapter to help you understand the best way to provide data access to customers and employees. Chapter 2 (Modifying URL Parameters and IDOR): This chapter shows you examples of how to exploit query string parameters to gain access to data, escalate privileges, or gain unauthorized access to web pages. Chapter 3 (Exploit URL Parameter Vulnerabilities to Gain Access to Files): URL parameters are often an unnoticed vulnerability, so this chapter shows you how to manipulate URL parameters to access sensitive files that contain data such as server configurations or application passwords. Chapter 4 (Hacking APIs with Missing Authentication): APIs provide critical backend functionality, so this chapter covers testing of API endpoints to find missing authentication controls or other vulnerabilities. Chapter 5 (CORS Misconfigurations): Understand CORS, pre-fetching, and how you can configure an API to allow authorized access from remote domains. Chapter 6 (Bad Redirects and Authentication): Developers often use redirects to bring authenticated users to specific application pages, so we cover checking authorization controls on pages that could be abused by internal users. Chapter 7 (Where to Go From Here?): Wrap-up and provide basic advice for the next steps. Protecting an application is a huge undertaking, so it’s usually best to hire a professional.

Owasp Top 10 broken authentication book cover

Related Articles

React2Shell Security Patch and CVE-2025-55182 Explained

December 6, 2025

CVE-2025-8489 Explanation: How a Mistake in a WordPress Hook Function Lets Attackers Gain Administrator Access

December 5, 2025

A Developer Guide to Performing a TLS Handshake

June 5, 2022

Using Python to Find Firebase Storage Security Misconfigurations Hardcoded in Repositories

April 25, 2022

CSV Injection Tutorial for Beginner Developers (with examples)

March 6, 2022

Categories

  • Azure Setup 2
  • Coding vulnerabilities 4
  • DevOps 1
  • Freelance Scams 2
  • General Security 1
  • ICO and Cryptocurrency Applications 1
  • Phishing 1
  • Programming 10
  • Programming News 2
  • Scam Emails 1
  • Secure coding 4
  • Security 11
  • Security News 4
  • Technical Analysis 2

Pinkhat Code

WordPress Theme by EstudioPatagon