• Community
    • Join Discord
    • Industry News
    • Discussions
    • Contact & Support
  • Learn
    • Featured Courses
    • All Courses
    • Categories
      • Cybersecurity Fundamentals
      • Networking Security
      • Application Security
      • Ethical Hacking
      • Cloud Security
  • Resources
    • Blog
    • Ebooks
    • Podcasts
    • Webinars
  • Pricing
  • About Cybr
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Community
      • Join Discord
      • Industry News
      • Discussions
      • Contact & Support
    • Learn
      • Featured Courses
      • All Courses
      • Categories
        • Cybersecurity Fundamentals
        • Networking Security
        • Application Security
        • Ethical Hacking
        • Cloud Security
    • Resources
      • Blog
      • Ebooks
      • Podcasts
      • Webinars
    • Pricing
    • About Cybr
    Sign in Sign up

    Category: Application Security

    Content and resources related to Application Security (AppSec)

    Hashing use cases

    Hashing use cases

    In practice, what is hashing used for? How is it being used in the real world? Let’s take a look at a few common hashing…

    Christophe July 18, 2022
    0 Comments
    Hash tables and rainbow table attacks banner

    Hash Tables, Rainbow Table Attacks, and Salts

    As we talked about, applications that properly handle passwords don’t actually store the passwords themselves in databases, but instead, store hashes of passwords. That’s why…

    Christophe July 11, 2022
    0 Comments
    Banner for plaintext versus encrypted versus hashed passwords

    Encrypted versus hashed passwords. What’s the difference?

    As you study for the CompTIA Security+ exam, it’s important that you understand the differences between plaintext, encrypted, and hashed passwords. It’s common to hear…

    Christophe June 25, 2022
    0 Comments
    Person working on computer

    What you need before submitting a bug bounty report

    I’m writing this because I’ve been seeing people struggle to understand when they’re ready to submit a bug report. Maybe they find something interesting as…

    Christophe October 22, 2021
    0 Comments

    How to fix ‘does not contain valid cloaked content ‘ in sqlmap

    While working through my Practical Guide to sqlmap for SQL Injections course, I ran into an issue with sqlmap’s included shellcodeexec. There was an error…

    Christophe August 26, 2021
    1 Comment
    Practical guide to sqlmap course banner

    New course: The Practical Guide to sqlmap for SQL Injection

    Ever since launching our Injection Attacks: The Free Guide course, we’ve received numerous requests to continue building SQL injection-related content, including how to use the…

    Christophe July 15, 2021
    4 Comments
    sqlmap cheat sheets

    6 sqlmap cheat sheets to help you find SQL injections

    Here’s a collection of cheat sheets we created to go along with our course: The Practical Guide to sqlmap for SQL Injection. If you find…

    Christophe July 14, 2021
    4 Comments
    XSS image alt tag banner

    Stored XSS vulnerability in image alt attribute to steal cookies (Bug Bounty)

    I recently found a stored XSS vulnerability through an image alt attribute. While I can’t share any details about where, I can share details about…

    Christophe May 13, 2021
    5 Comments
    Beginner's Guide to sqlmap banner

    New Course: Beginner’s Guide to sqlmap

    One of our most popular and requested content categories has been regarding SQL injections and the popular tool sqlmap that is used to help find…

    Christophe April 18, 2021
    4 Comments
    Injection Attacks NYU Tandon Engineering Badge

    Cybr’s Injection Attacks Course Badge Gets Added to NYU Cyber Fellows Program

    In addition to our Introduction to Application Security and Cross-Site Scripting badges, we are officially announcing the addition of the Injection Attacks badge to the…

    Christophe February 19, 2021
    0 Comments
    Load More

    Get notified of new posts

    Recent Posts

    • Network segmentation
    • Jump servers (aka bastion hosts)
    • Bluesnarfing and Bluejacking
    • Biometrics techniques and concepts for authentication
    • Key stretching concepts and algorithms

    Categories

    • Announcements
    • Application Security
    • Beginner
    • Career
    • Certifications
    • Cloud Security
    • Community
    • Cybersecurity
    • Cybersecurity Fundamentals
    • Ethical Hacking
    • Incident Response
    • Intermediate
    • Network Security
    • Programming Languages
    • Scripting

    Recent Comments

    • lifengquan52 on SQL Injections explained
    • Christophe on Performance-based Questions #1
    • pep on Performance-based Questions #1
    • lifengquan52 on Creating a home lab environment
    • Christophe on Performance-based Questions #1
    Cybr logo badge
    © 2023 - Cybr, Inc
    • Contact
    • Courses
    • Discord
    • Terms of Service
    • Privacy Policy

    Report

    There was a problem reporting this post.

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts

    Please allow a few minutes for this process to complete.

    Report

    You have already reported this .