Credential Stuffing with Burp Suite - PortSwigger

Credential Stuffing with Burp Suite - PortSwigger

Why This Matters Now Credential stuffing attacks are on the rise, fueled by the increasing number of data breaches that expose vast amounts of user credentials. The recent LinkedIn data breach, which compromised over 700 million records, has made this a critical concern for any organization handling user data. Attackers are leveraging these stolen credentials to automate login attempts across various platforms, leading to widespread account takeovers and data breaches. ...

Mar 09, 2026 · 6 min · 1127 words · IAMDevBox
HTTP-Only Cookies for Secure Authentication: Best Practices, Implementation Guide, and Protection Against XSS Attacks

HTTP-Only Cookies for Secure Authentication: Best Practices, Implementation Guide, and Protection Against XSS Attacks

HTTP-Only cookies are a crucial component of secure web authentication. They prevent JavaScript from accessing cookie data, which is essential for mitigating Cross-Site Scripting (XSS) attacks. In this post, we’ll dive into why HTTP-Only cookies matter, how to implement them correctly, and best practices to ensure your web application remains secure. The Problem Imagine this scenario: You’ve built a robust authentication system using session cookies. Users log in, receive a session token, and your server uses this token to verify their identity on subsequent requests. Everything seems fine until one day, an attacker injects malicious JavaScript into your site. This script can read the session cookie and hijack user sessions, leading to unauthorized access. ...

Nov 25, 2025 · 4 min · 749 words · IAMDevBox
OAuth 2.0 Authorization Flow Using Node.js and Express

OAuth 2.0 Authorization Flow Using Node.js and Express

I’ve built OAuth authentication for 40+ Node.js apps. The Authorization Code Flow is the gold standard for web applications - secure, battle-tested, and works with every major identity provider. Here’s how to implement it right. Clone the companion repo: Full runnable source with Redis sessions, Docker Compose, and test suite: git clone https://github.com/IAMDevBox/oauth-nodejs-express.git cd oauth-nodejs-express && cp .env.example .env && npm install → IAMDevBox/oauth-nodejs-express on GitHub Visual Overview: sequenceDiagram participant User participant App as Client App participant AuthServer as Authorization Server participant Resource as Resource Server User->>App: 1. Click Login App->>AuthServer: 2. Authorization Request AuthServer->>User: 3. Login Page User->>AuthServer: 4. Authenticate AuthServer->>App: 5. Authorization Code App->>AuthServer: 6. Exchange Code for Token AuthServer->>App: 7. Access Token + Refresh Token App->>Resource: 8. API Request with Token Resource->>App: 9. Protected Resource Why This Matters Most developers think OAuth is complicated. It’s not - if you understand the flow and avoid common mistakes. I’ve seen teams spend weeks debugging CSRF attacks, token storage issues, and session hijacking because they skipped critical security steps. ...

Jun 04, 2025 · 11 min · 2135 words · IAMDevBox