Application vulnerability due to Non Random Hash Functions
Understanding Attack Vector How HashMaps work Say a comment form on a blog accepts the parameters – first_name, last_name, comment – as post parameters. Internally, Tomcat stores these parameters as a HashMap. The logical structure of this HashMap is like this – “first_name” –> “Sripathi” “last_name” –> “Krishnan” “comment” —> “DoS using poor Hashes” But … Read more