Tarun Sharmatapstechie.hashnode.dev·Dec 19, 2024What is ORM and How it is Helpful to Us?Introduction to ORM Imagine you’re a developer managing a complex web application for an e-commerce platform. You’re dealing with tons of data: customer records, order details, inventory management, and more. Each day, you write SQL queries to insert...ORM (Object-Relational Mapping)
Khushi TrivediforKeploy Community Blogkeploy.hashnode.dev·Dec 18, 2024How Fuzz Testing Saved a Software Company Millions?What would happen if your software faced an unpredictable input that no one ever thought to test? Could it withstand the challenge or fail catastrophically? Software has been a backbone for every industry, whether e-commerce platforms or the finance ...fuzzing
Anik Kumar Nandiblog.anikweb.me·Nov 30, 2024Laravel SQL Injection Prevention: A Comprehensive GuideSQL Injection is a common and serious issue in web apps. It allows attackers to run any SQL queries on your database, which could lead to data breaches, data loss, or even taking over your app's backend. As a Laravel developer, it's really important ...221 readsLaravelanik nandi
Bhuwan Bhetwalblog.bhuwanbhetwal.com.np·Nov 7, 2024Breaking In: How RXSS and SQLi Can Lead to Full Account Takeover and Database AccessThese vulnerabilities were Identified on one of the YesWeHack’s Private Program. I was hunting late night when i received an invitation from one of the Private Program. As they Were Interested on critical reports. I was looking for SQLi, Command Exec...2 likes·939 readsSQL
Nicholas Diamondnicholasdiamond.hashnode.dev·Oct 18, 2024Hardening Node.js APIs Against Injection Attacks and Data BreachesAPI security is a critical aspect of building modern applications, especially as the threat landscape continues to evolve. Among the most common attack vectors targeting APIs are injection attacks, such as SQL injection and NoSQL injection. These att...232 readsNode.js
Ashlesh singh chouhanunlockingadminaccess.hashnode.dev·Oct 17, 2024The Power of SQL Injection: From Product Filters to Admin AccessIn this post, we'll explore how to exploit a SQL injection vulnerability in a non-Oracle database. SQL injection is one of the most dangerous security risks and can lead to unauthorized access to sensitive data. By following this lab, you'll learn ho...admin access
Nile Bitsnilebits.hashnode.dev·Oct 14, 2024How To Build Secure Django Apps By Using Custom MiddlewareIn today's digital world, when data breaches and cyber threats are more common than ever, developing safe online apps is essential. Django is a well-known and powerful web framework with integrated security measures. However, you might need to add mo...32 readsDjango
Indu Jawlacoders.hashnode.dev·Oct 14, 2024Types of Ethical Hacking: Choose yoursWeb Application Hacking: SQL InjectionSQL Injection is one of the most common web application vulnerabilities, where an attacker can manipulate the backend database by injecting malicious SQL queries through user input fields. Consider a scenario whe...#wirelesshacking
Reza Rashidiblog.redteamguides.com·Oct 10, 2024Awesome Sqlmap TampersSQLMap tamper scripts are widely used to bypass Web Application Firewalls (WAFs) during SQL injection attacks. Each script alters the SQL payload to avoid detection by WAFs from vendors like FortiWAF, F5, Barracuda, Akamai, Cloudflare, and Imperva. T...4.0K reads#sqlinjection
sudip adhikarisudip007.hashnode.dev·Sep 15, 2024SQL injectionIntroduction Before learning about SQL injection, it's important to understand SQL.SQL (Structured Query Language) is a language used to manage and interact with databases. It helps you create, update, or delete data. SQL injection is a type of web s...SQL