Dhananjay kulkarnidhananjaykulkarni.hashnode.dev·Jun 29, 2024How to Prevent SQL Injection VulnerabilitiesNow that you know what a SQL injection vulnerability is, how to find it, and how to exploit it, the next essential skill is learning how to prevent SQL injection vulnerabilities. This knowledge is crucial, especially when writing pentesting reports a...Discuss·1 likeSQL Injection#sqlinjection
Nile Bitsnilebits.hashnode.dev·Jun 27, 2024SQL Injection: Understanding the Threat and How to Avoid Ithttps://nilebits.com/blog/2024/06/thank-you-hostinger-for-addressing-fraudulent-domain-and-email-abuse-swiftly/ Web applications are still seriously threatened by SQL Injection (SQLi), a persistent issue in the constantly changing field of cybersecur...DiscussSQL
Azam Sajidaazamsajid.hashnode.dev·Jun 20, 2024Secure Dynamic HTML in Oracle APEX: Best Practices and PitfallsIntroduction In web applications, generating dynamic HTML content securely is crucial to prevent security vulnerabilities, especially Cross-Site Scripting (XSS) attacks. Oracle APEX offers various tools and methods to ensure secure HTML generation. O...Discuss·114 readsorclapex
Harsh Mangeharshmange.hashnode.dev·May 26, 2024What is SQL Injection and how to prevent it?SQL injection is a type of web application vulnerability that allows an attacker to execute arbitrary SQL code on a database. This can be used to steal sensitive data, modify or delete data, or even take control of the entire system. Example Here's a...Discuss·250 readsSQL
Atharv Patilatharvpatil.hashnode.dev·May 9, 2024"The Silent Threat: Understanding and Preventing SQL injection"In the dynamic world of cybersecurity, one threat stands as a silent predator, capable of infiltrating systems and exfiltrating sensitive data with remarkable precision: SQL injection. As web applications continue to dominate our digital landscape, t...DiscussSQL
0xiNPro0xshin.hashnode.dev·Apr 24, 2024SQL Injection Types Supported by SQLMap - SQL Map 01Objective: To provide a detailed, step-by-step guide on the various SQL injection types supported by SQLMap, enabling learners to understand and identify each type effectively. Introduction to SQLMap SQLMap is a powerful penetration testing tool for...DiscussCPTS Journeysqlmap
0xiNPro0xshin.hashnode.dev·Apr 21, 2024SQLi Series - Reading Files through SQL Injection - 08Introduction SQL Injection can be used for more than just gathering data from tables and databases It can also be leveraged to read and write files on the server In some cases, it can even lead to remote code execution on the back-end server Pri...Discuss·44 readspente
0xiNPro0xshin.hashnode.dev·Apr 19, 2024SQLi Series - Intro to SQL Union Injection II - 041.Understanding Union-Based SQL Injection a) Explanation: Union-based SQL injection allows attackers to retrieve data from different tables within the database by appending a UNION SELECT statement to the original query. The UNION operator combines...DiscussCPTS Journeypentesting
0xiNPro0xshin.hashnode.dev·Apr 14, 2024SQLi Series - Intro to SQL Union Injection - 031. Introduction to Union SQL Injection In the realm of SQL injection attacks, Union-based SQL injection stands out as a powerful technique that allows attackers to extract sensitive information from multiple tables and databases within a vulnerable a...Discuss·63 readsCPTS JourneyUnion Injection
0xiNPro0xshin.hashnode.dev·Apr 14, 2024SQLi Series - Basic Bypassing Techniques - 021. Introduction Now that we have a basic understanding of how SQL statements work, let's dive into SQL injection. Before executing entire SQL queries, we will learn how to modify the original query by injecting the OR operator and using SQL comments ...DiscussCPTS Journey#sqlinjection