What’s an SQL Injection?

SQL Injection What is an SQL injection? URL encoding Types of SQL injections How basic SQL injections work   What is an SQL injection? This code injection technique is used to attack data-driven applications. Attackers can insert SQL statements into an entry field on a vulnerable website for execution. A common reason for using this... Continue Reading →

Understanding Graylog and Log Management

Log Management Tools (Graylog) As you probably know by now keeping track of logs and alerts is a crucial part of security. Therefore, having tools that allows administrators to create an efficient way to manage their logs. The tool we are going to discuss in this post is Graylog, but first let’s look at Log... Continue Reading →

The Metasploit Framework

As I continue gaining experience in my virtual lab and reading of how to conduct countless exploits a tool used in nearly every scenario is Metasploit. I figured it is important to know exactly what this tool is, what it does, how it's made, etc... Choosing and configuring an exploit (code that enters a target... Continue Reading →

What is Nmap?

"Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service up time. Nmap uses raw IP packets in novel ways to determine what hosts... Continue Reading →

Create a website or blog at WordPress.com

Up ↑