Image of SQL logo

Understanding Union-Based SQL Injection

Union-based SQL Injection is a type of SQL injection attack that exploits the “UNION” operator in SQL to retrieve data from two or more

Read More
SQL Injection topic image

SQL Injection: Understanding the Threat and Implementing Secure Measures

SQL Injection (SQLI) is a type of security vulnerability that affects database-driven websites (These are websites or applications that have most of

Read More
Nessus by Tenable image

Vulnerability Scanning with Nessus

Scanning in a cybersecurity context can be regarded as the means to identify or detect live hosts, services, ports, and architecture of a system

Read More
Email inbox image

Email address gathering

In the context of penetration testing, email address gathering refers to the process of collecting email addresses for the purpose of conducting a

Read More
Target image

Hidden Facts About Identifying a Penetration Testing Target

In cybersecurity, the term “target” can refer to a number of different things, depending on the context. Generally, a target is a

Read More
Subdomain hunter

The Ultimate Guide To FINDING SUBDOMAINS

Hunting subdomains is quite important when performing a web application penetration test. To start with, it would be okay to understand what domains

Read More