Skip to content

Lukas Vileikis

Personal Website

  • Home
  • Blog
  • Articles
  • Projects
  • Speaking
  • Hacking MySQL

Ready to Break, Optimize, and Secure Your Database? Read Hacking MySQL: Breaking, Optimizing, and Securing MySQL for Your Use Case Today!

July 2, 2018

2017 OWASP Top 10 for PHP Developers Part 8: Insecure Deserialization

2017 OWASP Top 10 for PHP Developers Part 8: Insecure Deserialization

When developing a web application, web developers sometimes need to first turn data into a proper format so that.

June 27, 2018

2017 OWASP Top 10 for PHP Developers Part 7: Cross-Site Scripting (XSS)

2017 OWASP Top 10 for PHP Developers Part 7: Cross-Site Scripting (XSS)

We have all seen search forms, haven’t we? Take a look at mine: The above search form is pretty.

June 17, 2018

2017 OWASP Top 10 for PHP Developers Part 6: Security Misconfiguration

2017 OWASP Top 10 for PHP Developers Part 6: Security Misconfiguration

Web applications can be susceptible to all sorts of vulnerabilities: a web application can be vulnerable to at least.

June 11, 2018

2017 OWASP Top 10 for PHP Developers Part 5: Broken Access Control

2017 OWASP Top 10 for PHP Developers Part 5: Broken Access Control

Let’s take a scenario like so: I have a web application that allows people to buy software I created.

June 9, 2018

2017 OWASP Top 10 for PHP Developers Part 4: XML External Entities (XXE)

2017 OWASP Top 10 for PHP Developers Part 4: XML External Entities (XXE)

Ever processed XML files in your web application? If you did, you probably parsed their contents. And if you.

June 6, 2018

2017 OWASP Top 10 for PHP Developers Part 3: Sensitive Data Exposure

2017 OWASP Top 10 for PHP Developers Part 3: Sensitive Data Exposure

There is a lot of exposed data floating on the web. People hear about such events all the time.

June 1, 2018

2017 OWASP Top 10 for PHP Developers Part 2: Broken Authentication and Session Management

2017 OWASP Top 10 for PHP Developers Part 2: Broken Authentication and Session Management

While browsing the web, you click on a link. The link leads you to a page like this: Looks.

May 25, 2018

Other uses of .htaccess: Making a .htaccess-based WAF

If you’re a web developer, you’re probably fammiliar with .htaccess. If you’re not, let me give you a quick introduction:.

May 14, 2018

An old Ticket System Security Analysis

Since I started building websites few years ago, I’ve created a few projects. Some of them never saw daylight,.

Posts navigation

Older posts
Newer posts

© 2024, Lukas Vileikis

This work is licensed under a Creative Commons Attribution 4.0 International License.

  • Information
  • BreachDirectory
  • Hacking MySQL
  • Contact Me
  • Book a Meeting with Me

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

Lukas Vileikis
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.