Category: security

0

Types of SQL Injection

SQL Injection, also known as SQLi, is one of the most common vulnerabilities in web application. 🔗Goal of the article The goal of this article is not to explain what is an SQL injection or how they w

0

Common upload flaws

If a remote web server let you upload and execute scripts so this is beginning to turn turn bad. Here are some common upload flaws: extensions blacklist double extensions MIME type Null Byte 🔗Exten

0

Hardened Tor Browser with Selfrando

6 June 2016, the Tor Project announced a hardened version of Tor Browser: 6.5a1-hardened. Here some links: Download page for hardened builds (only avaible for Linux at this time). Distribution direct

0

Hide AES-256 encrypted zip file in a JPEG image

This how-to was made for Linux user. The user will need p7zip, exiv2 and optionally exif, exiftool, unzip. 🔗Create an AES-256 encrypted zip file 7z (p7zip for Linux) can produce zip-format archives w