Tutorials

Privilege Escalation via SQL Injection in Joomla 3.8.3 – Live Exploitation

It is common knowledge that there are bad people attacking systems on the Internet, regardless of the nature of the business. As a defensive countermeasure, organizations put their trust in solutions for defense from these cyber threats. The problem with this strategy is the vendor is not the victim of an attack and doesn’t absorb […]

Tools

Top 7 tools used for Solving Web Challenges

Security testing is the process of assessing and testing a system/application to discover security risks and vulnerabilities of the system and its data. There is no universal terminology but for our purposes, we define assessments as the analysis and discovery of vulnerabilities without attempting to actually exploit those vulnerabilities. We define testing as the discovery […]