LDAP Injection: From a Developer’s Perspective

Photo by John Schnobrich on Unsplash

Introduction

We all are familiar with injection such as SQL Injection, HTML Injection and many more. In the same way, we have an LDAP injection vulnerability that exists in application security and its severity can be very high as it can be used to do the authentication bypass.

A successful LDAP injection vulnerability can provide so much sensitive…

--

--

--

Security enthusiast working to secure web for others.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Integrating Asset Management into your SOC with Open XDR can be a force multiplier for your…

HTB —Sense Writeup

4 critical things SMEs should look out for in SaaS terms of service (ToS)

How I passed the CompTIA Security+ on the first attempt

CryptoDiceHero Status Updates

How is Cloud Security Accelerating the Pace of Innovation?

Best Practices for Building Secure APIs

www.norton.com/setup

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Gupta Bless

Gupta Bless

Security enthusiast working to secure web for others.

More from Medium

HTTP VERB TAMPERING:

Log4Shell — Simple Techincal Explanation of the Exploit

PRIVILEGE ESCALATION ON DOCKER

SSRF Vulnerability From a Developer’s Perspective