Cybersecurity

Cybersecurity
Photo by Michael Geiger / Unsplash

Exploits

Exploits are a wild thing, at first you're just messing around and before you know it, you've suddenly uncovered how to access other people's calendars. That's when the money starts talking. In my exploit series I describe and uncover how certain exploits work.

What are SQL injection attacks?
In short – SQL injections also known as SQLi happen when user input becomes embedded into an SQL query instead of just being data. This means the server doesn’t have protective mechanisms in place such as input sanitization and prepared statements. In this article we will cover the importance of SQL

TryHackMe Walkthroughs

Ever walked in someone else's shoes? No? Well it doesn't matter. In my TryHackMe walkthrough series I show and describe my approach.

TryHackMe: Basic Pentesting Walkthrough/Writeup
Have you ever been walked through? If not, let’s find out what this means in the first edition of my TryHackMe walkthrough series!
TryHackMe: Injectics Walkthrough Writeup
In the second edition of my TryHackMe walkthrough, I cover the Injectics room challenge which is all about injection attacks. To my knowledge this room covers SQL injections, and Server Side Templating Injections (SSTIs) What is the flag value after logging into the admin panel? Going through the different pages