Shodan is a search engine to find specific services such as webcams, SCADA systems, linksys… Its operation is simple but effective: it scans the whole…
Posts published in “PoC’s”
Today I bring you a very interesting type of SQL Injection, and that is not very well known. It’s a variation of Blind SQL Injection.if…
This is the third post on the post-exploitation method based on code caves. In the first part I showed you how to create a basic…
This is the second part of the set of posts about Post Explotation Backdooring. If you haven’t read the previous post, I recommend you do…
In last week’s post I introduced the zip bombs and explained how to create a zip bomb using the recursion technique. I recommend that you…
When a file is compressed, its size is reduced. It’s based on a simple principle: if you have a file with the text “aaaaaabbb”, which…
After the posts about SQL Injection and NoSQL Injection, today I bring you the XSS Injection. This attack consists of injecting malicious code into benign…
In previous posts I have talked about SQL injections. It is usually the first example of computer security that is given to a student: ” ´…
As time goes by this domain gets bigger and bigger… Thanks to you! With less than a year of life, Google Analytics has notified me…
Google is one of the most famous search engines in the world. However, searching Google is an art that many people don’t quite understand. And…