Articles

A discursive source of knowledge on Information Security including topics on Pentesting,
Bug Bounty, Red Teaming, Threat Hunting, Hacking Stories, and more.

Exploit XSS Injections with a Powerful One-Line Technique

Exploit XSS Injections with a Powerful One-Line Technique

In this article, we’ll demonstrate practical methods for detecting and exploiting Cross-Site Scripting (XSS) injections. These techniques can be applied during source code security reviews to enhance speed and accuracy in your methodology, benefiting both security professionals and bug bounty hunters.

read more
Common and Uncommon types of SQL Injection

Common and Uncommon types of SQL Injection

In this article, we’ll explain some of the most common and uncommon types of SQL Injection. We’ll also discuss how these attacks can impact your company and your customers, and show you the measures you need to take to mitigate and minimize such risks.

read more
How Misconfigurations in Linux can leave you vulnerable to Attackers

How Misconfigurations in Linux can leave you vulnerable to Attackers

Security misconfigurations in Linux systems occur when necessary security controls are not properly implemented for servers or web applications. In this article, we’ll emphasize the importance of detecting and addressing misconfigurations through practical examples and tools like Nmap and the Metasploit Framework.

read more