The Tech PlatformJan 12, 2022SQLSQL Injection : What are the Types of SQL Injection. How to Detect and Prevent SQL InjectionSQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend database manipulation to access...
The Tech PlatformJan 12, 2022Cyber SecurityHow To Hack Any Web Application (Website)This article is the third and final installment to this series. This is just a mere introduction tothese following topics. I will be...
The Tech PlatformDec 20, 2021.NETInjecting .Net Assembly Into .Net ApplicationAs demonstration purpose, i have written the following app. As you already got what the code does (a simple msgbox says “Hello World from...
The Tech PlatformSep 15, 2021Cyber SecurityStored XSS to RCE Chain as SYSTEM in ManageEngine ServiceDesk PlusThe unauthorized access of FireEye red team tools was an eye-opening event for the security community. In my personal opinion, it was...
The Tech PlatformSep 6, 2021Cyber SecurityTop 10 Ethical Hacking Tools and their FeaturesEthical hacking is the act of discovering vulnerabilities and weaknesses of systems and applications by reproducing the reasons and...