josemlWeb AttacksAs web applications are becoming very common and being utilized for most businesses, the importance of protecting them against malicious…Jun 26
Christophe LimpalairBypass admin login with SQL Injections (sqlmap)As a popular request, let’s see how we can use SQL injections to bypass vulnerable login pages without needing a valid username or…Oct 6, 20212
Ryan StewartDetecting Signs of a Potential Local File Inclusion (LFI) AttackThis write-up is intended for the LetsDefend “SOC170” Investigation and is for educational purposes only.Jan 25Jan 25
josemlWeb AttacksAs web applications are becoming very common and being utilized for most businesses, the importance of protecting them against malicious…Jun 26
Christophe LimpalairBypass admin login with SQL Injections (sqlmap)As a popular request, let’s see how we can use SQL injections to bypass vulnerable login pages without needing a valid username or…Oct 6, 20212
Ryan StewartDetecting Signs of a Potential Local File Inclusion (LFI) AttackThis write-up is intended for the LetsDefend “SOC170” Investigation and is for educational purposes only.Jan 25
Ryan StewartCracking the Code: Understanding Web Attack ExploitsThis write-up is intended for the LetsDefend “Investigate Web Attack challenge” and is for educational purposes only.Dec 14, 2023
Melusi shokoinSystem WeaknessInvestigate Web attack. Letsdefend challenge #blueteamHello, my name is Melusi Shoko, a blue teamer. This is my first investigation of a web attack. This challenge may be found here if you are…Apr 21, 20222