<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: 0x7b</title>
    <description>The latest articles on DEV Community by 0x7b (@x0x7b).</description>
    <link>https://dev.to/x0x7b</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3707707%2F382cee17-5e8f-4bb2-bf4e-5b439ab890ce.jpeg</url>
      <title>DEV Community: 0x7b</title>
      <link>https://dev.to/x0x7b</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/x0x7b"/>
    <language>en</language>
    <item>
      <title>[Boost]</title>
      <dc:creator>0x7b</dc:creator>
      <pubDate>Wed, 14 Jan 2026 18:19:55 +0000</pubDate>
      <link>https://dev.to/x0x7b/-147i</link>
      <guid>https://dev.to/x0x7b/-147i</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/x0x7b" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3707707%2F382cee17-5e8f-4bb2-bf4e-5b439ab890ce.jpeg" alt="x0x7b"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/x0x7b/observing-behavioral-anomalies-in-web-applications-beyond-signature-scanners-g6p" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Observing Behavioral Anomalies in Web Applications Beyond Signature Scanners&lt;/h2&gt;
      &lt;h3&gt;0x7b ・ Jan 12&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#monitoring&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#performance&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#testing&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>monitoring</category>
      <category>performance</category>
      <category>security</category>
      <category>testing</category>
    </item>
    <item>
      <title>Observing Behavioral Anomalies in Web Applications Beyond Signature Scanners</title>
      <dc:creator>0x7b</dc:creator>
      <pubDate>Mon, 12 Jan 2026 21:35:54 +0000</pubDate>
      <link>https://dev.to/x0x7b/observing-behavioral-anomalies-in-web-applications-beyond-signature-scanners-g6p</link>
      <guid>https://dev.to/x0x7b/observing-behavioral-anomalies-in-web-applications-beyond-signature-scanners-g6p</guid>
      <description>&lt;p&gt;Most web scanners rely on payload signatures and response matching. In practice, I often see cases where the server behaves differently without any explicit error:&lt;/p&gt;

&lt;p&gt;latency spikes&lt;/p&gt;

&lt;p&gt;unexpected redirects&lt;/p&gt;

&lt;p&gt;status changes&lt;/p&gt;

&lt;p&gt;Signature-based tools usually report these scenarios as “clean”, even though they indicate backend instability or logic issues.&lt;/p&gt;

&lt;p&gt;The challenge is that these anomalies don’t fit traditional vulnerability categories like SQLi or XSS — they’re about how the system reacts under unusual input, not whether a known exploit triggers.&lt;/p&gt;

&lt;p&gt;Example Observation&lt;/p&gt;

&lt;p&gt;Below is a sample result from testing &lt;a href="http://testphp.vulnweb.com/artists.php:" rel="noopener noreferrer"&gt;http://testphp.vulnweb.com/artists.php:&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs7qbe4w2u5oy57u69dmz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs7qbe4w2u5oy57u69dmz.png" alt=" " width="709" height="535"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Screenshot showing latency spikes (RTT) and body hash changes for specific inputs. Signature-based scanners would likely mark this as “clean”.&lt;/p&gt;

&lt;p&gt;Notice:&lt;/p&gt;

&lt;p&gt;artist=SLEEP(1) causes response time to jump from ~197ms → 3212ms&lt;/p&gt;

&lt;p&gt;BODY_HASH changes indicate server response altered&lt;/p&gt;

&lt;p&gt;Other inputs (%22, %5C, %255c) also trigger body changes without explicit errors&lt;/p&gt;

&lt;p&gt;These anomalies highlight how a server can behave unexpectedly under test conditions, which traditional signature-based scanners often miss.&lt;/p&gt;

&lt;p&gt;I’m curious how others in web security detect and interpret these kinds of behavioral anomalies during testing.&lt;/p&gt;

&lt;p&gt;(Optional reference for context: &lt;a href="https://github.com/x0x7b/Blink" rel="noopener noreferrer"&gt;Blink&lt;/a&gt;&lt;br&gt;
)&lt;/p&gt;

</description>
      <category>monitoring</category>
      <category>performance</category>
      <category>security</category>
      <category>testing</category>
    </item>
  </channel>
</rss>
