Lorenzo StellaPassword Reset Poisoning — Gain Access to User AccountsPassword ResetSep 10, 2023Sep 10, 2023
Lorenzo StellaExploiting Cookies to Gain Access to Another User’s Account — Auth Vulnerability ExampleThis will be a purely practical article where we’ll look at an authentication vulnerability that allows an unauthorized attacker to gain…Sep 9, 20231Sep 9, 20231
Lorenzo StellaAn Intro to Authentication Vulnerabilities — With ExamplesAuthentication is the process through which the identity of the user of a system is verified. That means it is through authentication we…Sep 6, 2023Sep 6, 2023
Lorenzo StellaGuesswork Needed — Scripting for Blind SQL InjectionTopic introductionAug 27, 2023Aug 27, 2023
Lorenzo StellaDumping Passwords From Database — Union-based SQL Injection ScriptingIn the last article we discussed various types of SQL injection and presented a basic example of an in-band union-based injection attack…Aug 27, 2023Aug 27, 2023
Lorenzo StellaNot Allowed To Know — Navigating Databases With SQL InjectionWhat is SQL?Aug 24, 2023Aug 24, 2023
Lorenzo StellaIf You Can Read It, You Can Break It — Deobfuscation In ActionTopic IntroductionAug 23, 2023Aug 23, 2023