Websec Cybersecurity Blog
Expert insights, trends, research findings, and best practices from our security team to help you strengthen your organization's security posture.
Solutions for challenge 2B
A detailed explanation of the SQL Injection challenge 2B and the many solutions used to solve this challenge.
Solutions for challenge 2A
A detailed explanation of the SQL Injection challenge 2A and the many solutions used to solve this challenge.
A series of SQL Injection challenges
I want to introduce three SQL Injection challenges which were created for a CTF, but have yet to be solved... Could you be the first?
Using Burp to exploit a Blind SQL Injection
How to use Burp Suite to automate the process of extracting information from a SQL database through a Blind SQL Injection.
Cookie Stealing By Router Pharming (2Wire)
Multiple stage exploit used to obtain cookies of many domains by exploiting several vulnerabilities on 2Wire routers.
Remote credential and configuration disclosure of Huawei HG5XX devices using Nmap.
A new NSE script called "http-huawei-hg5xx-vuln" has been added to Nmap which exploits a couple of vulnerabilities found in Huawei HG5XX modems.