Tech News

Familiar With SQL Injection Vulnerability – Meet Ihsan Sencan

Meet Ihsan Sencan, a security researcher from Turkey who found more than 15+ SQL Injection Vulnerabilities in various Joomla Components in just one day and all related exploits have been published to various portals like Exploit-db.com, packetstormsecurity.org, cxsecurity.com and 0day.today etc. He also found more than 50+ SQL Injection Vulnerabilities in other Joomla Components/Modules in […]

Tech Articles

Handy MySQL Commands – Cheatsheet 2018

Designing the database is a key step, largely because changes to the database at a later date have far larger implications and potential complications than changing any other aspect of the site. Adding functionality through database changes is a steep challenge and fixing database flaws is excruciating, so make every effort you can to get the database design right […]

Tech Articles

5 Most Commonly Used Nmap Commands

Nmap supports many scanning technologies, such as: UDP, TCP connect(), TCP SYN (half-open scan), ftp proxy (bounce attack), reverse flag, ICMP, FIN, ACK scan, Xmas Tree, SYN Scan and null scan. Nmap also provides some advanced features, such as: detecting operating system types through TCP/IP stack features, secret scanning, dynamic delay and retransmission calculations, parallel […]