stackzero.hashnode.devSecret Codes Unlocked: How to Implement Substitution CiphersAre you ready to implement substitution ciphers with your own hands and take your encryption skills to the next level?In our previous article, we explored the fascinating world of substitution ciphers and how we can use them to encode our secret mess...Aug 14, 2023·9 min read
stackzero.hashnode.devSubstitution ciphers? An overview of the basicsSubstitution ciphers are one of the simplest and oldest methods of encryption. They involve replacing plaintext letters or characters with others in a fixed pattern to create ciphertext.They represent probably the most widely used encryption system i...Aug 12, 2023·8 min read
stackzero.hashnode.devHack File Inclusion in DVWA: A Full WalkthroughIn this tutorial, I’m going to show you how to exploit the file inclusion vulnerability in DVWA! But before doing that, for those of you who have not yet read my previous article, here is a very brief introduction! Basically, file inclusion vulnerabi...Aug 11, 2023·8 min read
stackzero.hashnode.devHow To Exploit File Inclusion Vulnerabilities: A Beginner’s Introduction.In this article, we will be exploring the ins and outs of file inclusion vulnerability exploitation. We will cover what file inclusion vulnerabilities are, how they work, and how hackers can exploit them. I’m going to try to make this introduction to...Aug 10, 2023·10 min read
stackzero.hashnode.devWhat is unrestricted file upload vulnerability? And How to exploit it on DVWA!A file upload vulnerability also called unrestricted file upload or arbitrary file upload is a potential security risk that allows an attacker to upload malicious files to a web server. It occurs when an application does not properly validate the fil...Aug 9, 2023·9 min read