• Community
    • Join Discord
    • Industry News
    • Discussions
    • Contact & Support
  • Learn
    • Categories
      • Cybersecurity Fundamentals
      • Networking Security
      • Application Security
      • Ethical Hacking
    • Featured Courses
    • All Courses
  • Resources
    • Blog
    • Ebooks
    • Podcasts
    • Webinars
  • About Cybr
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Community
      • Join Discord
      • Industry News
      • Discussions
      • Contact & Support
    • Learn
      • Categories
        • Cybersecurity Fundamentals
        • Networking Security
        • Application Security
        • Ethical Hacking
      • Featured Courses
      • All Courses
    • Resources
      • Blog
      • Ebooks
      • Podcasts
      • Webinars
    • About Cybr
    Sign in Sign up

    Category: Application Security

    Content and resources related to Application Security (AppSec)

    Backdoor with Weevely and Commix

    Uploading Backdoor Shells with Weevely and Commix

    Now that we’ve reviewed OS Command injection concepts like how they work, the impact they can have, and techniques that can be used to exploit…

    Christophe September 22, 2020
    0 Comments
    What are OS Command Injections banner

    OS Command Injections: How they work, and example techniques

    When I first heard the term OS Command injections, or “Shell injection” as some people refer to it, I don’t know why but I assumed…

    Christophe September 16, 2020
    0 Comments

    Cybr Lesson #1: Mistakes Made & Lessons Learned the EASY Way!

    I love quotes! I mean… really love them. In just one or two lines I can get or give the inspiration or motivation I need…

    Shawna September 14, 2020
    0 Comments
    SQLi cheatsheet banner

    8 SQL Injection Cheat Sheets and References you need

    Now that we’ve covered general concepts of SQL for SQL injections, and we’ve learned the basics of powerful SQL injection techniques, let’s gather SQL injection…

    Christophe September 1, 2020
    0 Comments

    How To Hunt for Web App Vulnerabilities Hands-on!

    I’ve said it again and again, and I think most members of the technical community would agree that the fastest, most effective, most fun way…

    Shawna August 20, 2020
    0 Comments
    SQL Injections Explained - Banner

    What are SQL Injections (SQLi)? Introduction to powerful techniques

    We’ve talked about what SQL is, but now, let’s talk about one of the most common and dangerous web-based attacks: SQL injections (aka SQLi). In…

    Christophe August 17, 2020
    0 Comments
    SQL primer for SQL injections cover

    A quick SQL primer for SQL injections

    While there are many other tutorials and resources out there that cover SQL, I wrote this blog post to give you a quick SQL primer…

    Christophe August 13, 2020
    0 Comments
    DVWA database passwords cracking

    Blind SQL Injections with SQLMap against the DVWA

    As part of our Injection Attacks: The Free 2020 Guide course, we reviewed concepts of SQL injections, including what blind injections are. Then, we practiced…

    Christophe August 11, 2020
    0 Comments
    socat reverse shell os command injection banner

    Create a reverse shell with Socat – DVWA OS Command Injections

    In our Injection Attacks course, we perform different OS Command Injections to demonstrate how this vulnerability can be exploited in the Damn Vulnerable Web Application…

    Christophe July 23, 2020
    2 Comments
    Install OWASP Juice Shop on Kali Banner

    Set up the OWASP Juice Shop on Kali with Docker [Quickest Method]

    Installing the OWASP Juice Shop on Kali with Docker is super fast because you don’t have to install anything but Docker. It also makes cleaning…

    Christophe July 20, 2020
    10 Comments
    Load More

    Get notified of new posts

    Recent Posts

    • Are your passwords strong enough?
    • What to know about vulnerability scans for the Security+ exam
    • Ultimate Guide to Passing the CompTIA Security+ Certification (SY0-601)
    • Initialization Vector (IV) attacks with WEP [CompTIA Security+]
    • Software updates and the role they play in cybersecurity

    Categories

    • Announcements
    • Application Security
    • Beginner
    • Career
    • Certifications
    • Community
    • Cybersecurity
    • Cybersecurity Fundamentals
    • Ethical Hacking
    • Incident Response
    • Intermediate
    • Network Security
    • Programming Languages
    • Scripting

    Recent Comments

    • Anthony on Techniques part 1
    • Daniel on Mounting an attack with SQLMap
    • Daniel on Mounting an attack with SQLMap
    • Daniel on SQL injection attacks by hand
    • Daniel on SQL injection attacks by hand
    Cybr logo badge
    © 2022 - Cybr, Inc
    • Contact
    • Teach at Cybr
    • Courses
    • Forums
    • Terms of Service
    • Privacy Policy

    Report

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts

    Please allow a few minutes for this process to complete.

    Report

    You have already reported this