What you need before submitting a bug bounty report
I’m writing this because I’ve been seeing people struggle to understand when they’re ready to submit a bug report. Maybe they find something interesting as…
Content and resources related to Application Security (AppSec)
I’m writing this because I’ve been seeing people struggle to understand when they’re ready to submit a bug report. Maybe they find something interesting as…
While working through my Practical Guide to sqlmap for SQL Injections course, I ran into an issue with sqlmap’s included shellcodeexec. There was an error…
Ever since launching our Injection Attacks: The Free Guide course, we’ve received numerous requests to continue building SQL injection-related content, including how to use the…
Here’s a collection of cheat sheets we created to go along with our course: The Practical Guide to sqlmap for SQL Injection. If you find…
I recently found a stored XSS vulnerability through an image alt attribute. While I can’t share any details about where, I can share details about…
One of our most popular and requested content categories has been regarding SQL injections and the popular tool sqlmap that is used to help find…
In addition to our Introduction to Application Security and Cross-Site Scripting badges, we are officially announcing the addition of the Injection Attacks badge to the…
According to both OWASP and CWE, Cross-Site Scripting is one of the top 10 most dangerous web application security risks, and for good reason: OWASP’s…
SQLMap is a popular open-source penetration testing tool used to detect and exploit SQL injection vulnerabilities. In prior posts, we looked at general concepts of…
A lot of times, especially when you join smaller organizations, there are no (or very few) formal processes in place. The approach taken to secure…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.