Muhammed Kılıçblog.muhammedkilic.com·Jul 11, 2023The Power of Secure Coding Practices: Safeguarding MongoDB Against ExploitationHello everyone, I need to tell a little story first: Several months ago I was working on a side project for automating the election results display. I had a quick development process and published the website with Ampt and the database server. My Sec...Discuss·352 readsMongoDB
Stackzerostackzero.hashnode.dev·Jun 30, 2023How to embed shellcode payload into an executableA good malware analyst has to know how to embed shellcode payload into an executable in just a few minutes, which is the best way to recognize it during analysis. Trojans or, more generally, some malware often embed shellcode within their code, in pa...Discuss·91 readsshellcode
Kristof RiebbelsProdotnet.kriebbels.me·Jun 25, 2023How to Consume Dot Net 6 Configuration in Your Services EffectivelyPreviously on... In my previous blog posts, I wrote about the modularity of the configuration that Dotnet 6 offers. About sources and sections and how to register them. I mentioned how to manually build the configuration object and how to use the def...Discuss·56 readsDotNetdotnet
Francesco Perticarariblog.francescoperticarari.com·Jan 23, 2023How to inject code into an iframeInjecting code or prefilling fields in an iframe can be a tricky task, but with a little bit of know-how, it's definitely doable. If you're looking to add some extra functionality to your website, or if you just want to streamline the user experience...Discuss·12 likes·7.3K readsProgramming for Startup Engineersiframe
Shay Randredmethod.hashnode.dev·Jan 9, 2023How to Discover SQL InjectionsThe process of finding SQL injection vulnerabilities involves identifying user data entry, tampering with the data sent to the application, and identifying changes in the results returned by the server. You have to keep in mind that tampering with th...Discuss·750 readsSQLi
Akasaru0akasaru0.hashnode.dev·Sep 2, 2022[RT] PHP - Injection de commande (10 pts)Partie 1 Énumération: Notre point de départ est cette page web Cette page, nommé "Ping Service" nous offre une entrée user avec comme valeur par défaut 127.0.0.1 Je vais donc tester avec cette adresse ip. Partie 2 Exploitation : Nous avons donc ic...Discuss·1 like·2.7K readsRoot Meroot-me