Posts by Category

Tutorials

SQL Injection - Cyard Challenges

Hello, in this writeup, I will talk about how to find and exploit SQL Injection in `lims` app provided by [Cyard](htt...

10 minute read

Web Security Vulnerabilities - Server Side Template Injection (SSTI)

Server-Side Template Injection, also known as SSTI, is a web security vulnerability that allows an attacker to inject...

8 minute read

Web Security Vulnerabilities - Remote Code Execution

Remote Code Execution, also known as RCE is a security vulnerability that allows an attacker to gain unauthorized acc...

4 minute read

Web Security Vulnerabilities - File Upload Vulnerabilities

File upload vulnerabilities arise when an application allows users to upload files to its system without properly san...

8 minute read

Web Security Vulnerabilities - Local File Inclusion (LFI)

Local File Inclusion also known as LFI is a web security vulnerability that allows an attacker to include files from ...

8 minute read

Web Security Vulnerabilities - Insecure Direct Object Reference (IDOR)

Insecure Direct Object Reference, also known as IDOR, is a type of access control vulnerability that occurs when an a...

5 minute read

Web Security Vulnerabilities - XML external entity (XXE)

XML external entities (XXE) are entities defined outside of the XML document and referenced within it. They are a fea...

9 minute read

Web Security Vulnerabilities - Broken Authentication

Authentication is the process of verifying the identity of a user. It ensures that the person or system interacting w...

9 minute read

Web Security Vulnerabilities - Server Side Request Forgery

Server Side Request Forgery also known as SSRF, is a web security vulnerability that allows an attacker to manipulate...

6 minute read

Web Security Vulnerabilities - SQL Injection

SQL Injection, also known as SQLI, is a web security vulnerability that allows an attacker to inject malicious querie...

13 minute read

Web Security Vulnerabilities - Cross Site Scripting (XSS)

Cross-Site Scripting, also known as XSS, is a web security vulnerability that allows attackers to inject malicious sc...

12 minute read

SIEM Tutorial - Part 3

Hello, in part 2, we covered what Splunk is, its components, explored its interface, and solve a small piece of the `...

4 minute read

SIEM Tutorial - Part 2

Hello security analysts, today I'm back with the second part of the SIEM tutorial. In the first part, we discussed lo...

6 minute read

SIEM Tutorial - Part 1

Hello everyone, today I'm going to share with you a series of tutorials about SIEM solutions. Tutorial consists of th...

7 minute read

Back to top ↑

HackTheBox

Back to top ↑