In last week’s post I introduced the zip bombs and explained how to create a zip bomb using the recursion technique. I recommend that you…
Posts published in “PoC’s”
When a file is compressed, its size is reduced. It’s based on a simple principle: if you have a file with the text “aaaaaabbb”, which…
After the posts about SQL Injection and NoSQL Injection, today I bring you the XSS Injection. This attack consists of injecting malicious code into benign…
In previous posts I have talked about SQL injections. It is usually the first example of computer security that is given to a student: ” ´…
As time goes by this domain gets bigger and bigger… Thanks to you! With less than a year of life, Google Analytics has notified me…
Google is one of the most famous search engines in the world. However, searching Google is an art that many people don’t quite understand. And…
Have you ever been told that if you find a USB stick on the floor, you shouldn’t put it in your computer? Today I’ll show…
In this other post I talked about passwords and the conditions that must be met to be considered secure. However, if we enter the world’s…
Many times it is not necessary to hack into anything to get credentials or confidential data. Many developers have the strange habit of leaving sensitive…
In this new post I’m going to talk about one of the best known and most frequent techniques to find today: SQL injections. I will…