Home Innovation Lab Security Threat Lab
Security Education

Security Threat Lab

Understand common web application attacks with real examples, how they work, and how to defend against them. Educational use only — be a better developer.

1 Critical Severity
5 High Severities
2 Medium Severities
Click any card to explore the threat
Critical

SQL Injection

A malicious user inserts SQL code into an input field to manipulate the database.

See attack example & defence →
High

XSS (Cross-Site Scripting)

Attacker injects malicious scripts into pages viewed by other users, stealing sessions or redirecting victims.

See attack example & defence →
High

CSRF (Cross-Site Request Forgery)

Tricks authenticated users into submitting unintended requests — such as changing passwords or transferring funds — from another site.

See attack example & defence →
High

Brute Force & Rate Limiting

Automated tools attempt thousands of password combinations per minute to compromise user accounts or abuse API endpoints.

See attack example & defence →
High

Insecure File Upload

Attacker uploads a malicious script disguised as an image or document, which can then be executed on the server.

See attack example & defence →
Medium

Sensitive Data Exposure

Credentials, API keys, or personal data are stored or transmitted insecurely — in plain text, logs, or public repositories.

See attack example & defence →
High

Session Hijacking

Attacker steals or predicts a valid session token to impersonate an authenticated user without knowing their password.

See attack example & defence →
Medium

Directory Traversal

Attacker manipulates file path inputs using ../ sequences to access files outside the intended directory, including system files.

See attack example & defence →

AI Security Advisor

Describe your system or paste a code snippet. Get an AI security review with vulnerabilities identified and fixes suggested.

Powered by Krest AI