web-security

ModSecurity WAF rules for common web attack patterns

A WAF is not a license to ignore secure coding, but it can still buy useful time and visibility. I tune rules for known attack classes and watch false positives aggressively during rollout. Managed poorly, a WAF becomes operational pain; managed well,

sqlmap workflow for approved injection testing

Automated SQL injection testing is useful when it is tightly scoped and coordinated. I keep requests reproducible, use captured traffic as the starting point, and avoid reckless options that create unnecessary blast radius. Tools are not the problem h

Front-end security - XSS and CSRF prevention

Front-end security protects users from malicious attacks. I prevent Cross-Site Scripting (XSS) by sanitizing user input and using textContent instead of innerHTML. Content Security Policy (CSP) headers restrict resource loading to trusted sources. Cro

Web application DAST automation with OWASP ZAP baseline scans

DAST is useful when it is fast enough to run regularly and scoped enough to avoid chaos. I use baseline scans on pull request environments to catch missing headers, obvious injection risk, and regressions in exposed attack surface. It is not a substit