-
Protecting against Blind SQLi: Time Delay and Conditional Error Attacks, Part 2
Blind SQL Injection with time delay is a type of attack that is used to extract information from a database by injecting malicious code into an application’s input fields. Unlike traditional SQL Injection attacks, the results of the attack are not immediately visible. Instead, the attacker uses a time delay to confirm the success of…
-
Blind SQL Injection (SQLi): Understanding and Exploiting Vulnerabilities in Web Applications and Databases
Blind SQL Injection attacks are a serious threat to web applications and databases. They exploit vulnerabilities in the software to gain unauthorized access to sensitive information. In this blog post, we will dive deeper into the topic of blind SQLi and discuss the most effective ways to prevent such attacks.
-
The Flipper Zero: Exploiting the Power of RFID and NFC Technology
The Flipper Zero is a versatile and powerful device that can be used for a wide range of applications, from testing security to accessing doors and even fooling around with screens and wireless protocols. However, it is important to note that it can also be used for nefarious purposes if misused, and thus it’s important…
-
Optus data breach: hacker blames company
On September 22, 2022 a security breach took place on Optus, the Australian telecommunications company compromising 9,800,000 customers. Approximately 38% of the country.
-
Hydra Brute Force Password Cracker Overview via TryHackMe
Hydra is used to brute force passwords. The goal is to crack a password by using a long list of potential passwords.
-
Burp Suite Community fundamentals overview via TryHackMe
Burp Suite is the class-leading vulnerability scanning, penetration testing, and web app security platform. This is an introduction to the platform and some of its functionality.
-
Nmap network scanning tool Walkthrough via TryHackMe
As part of the Hacking with Hayden series: An in depth look at scanning with Nmap, a powerful network scanning tool