Category: security

0

Check SSH fingerprint

🔗Display the default fingerprint 🔗Of a key You can either use the public key or private key to obtain the fingerprint (default is SHA256 in base64). 1234$ ssh-keygen -lf ./id_ed25519256 SHA256:jISol

0

Types of SQL Injection

SQL Injection, also known as SQLi, is one of the most common vulnerabilities in web application. 🔗Goal of the article The goal of this article is not to explain what is an SQL injection or how they w

0

Common upload flaws

If a remote web server let you upload and execute scripts so this is beginning to turn turn bad. Here are some common upload flaws: extensions blacklist double extensions MIME type Null Byte 🔗Exten

0

Hardened Tor Browser with Selfrando

6 June 2016, the Tor Project announced a hardened version of Tor Browser: 6.5a1-hardened. Here some links: Download page for hardened builds (only avaible for Linux at this time). Distribution direct