Latest Posts

All Posts

How Security Researcher Found a DOM XSS Inside NASA’s Systems

How Security Researcher Found a DOM XSS Inside NASA’s Systems

November 20, 2025 7 min read

A complete, defensive-focused deep dive into how a DOM XSS vulnerability was discovered inside a NASA system - from recon, JavaScript analysis, DOM Invader tracing, exploit validation, impact analysis, and actionable mitigation strategies.

Lab: Blind SQL injection with time delays

Lab: Blind SQL injection with time delays

October 22, 2025 8 min read

Beginner-friendly walkthrough: exploit a blind SQL injection using time delays (pg_sleep) to confirm and demonstrate the vulnerability. Includes step-by-step Repeater workflow, proof-of-concept payloads, troubleshooting, detection and remediation guidance.

Lab: SQL injection attack, listing the database contents on Oracle

Lab: SQL injection attack, listing the database contents on Oracle

October 21, 2025 7 min read

Step-by-step, beginner-friendly walkthrough: enumerate Oracle schema (tables & columns) via UNION SQLi, extract user credentials, and log in as administrator. Includes exact payloads (placeholders), Burp Repeater workflow, defenses, and troubleshooting.

Lab: SQL injection attack, querying the database type and version on Oracle

Lab: SQL injection attack, querying the database type and version on Oracle

October 20, 2025 8 min read

Beginner-friendly, step-by-step walkthrough: use a UNION-based SQL injection against an Oracle backend to reveal the database version string (v$version / BANNER). Includes exact payloads (placeholders), Repeater workflow, troubleshooting, detection recipes and developer remediation.

Lab: SQL injection with filter bypass via XML encoding

Lab: SQL injection with filter bypass via XML encoding

October 19, 2025 9 min read

Beginner-friendly, hands-on walkthrough: bypass a WAF using XML encoding (Hackvertor), perform a UNION-based SQLi in an XML parameter, exfiltrate `username||'~'||password`, and log in as administrator. Includes full Repeater/Exploit flow, why each step works, defensive remediation, and real-world examples.

Lab: Blind SQL injection with out-of-band data exfiltration

Lab: Blind SQL injection with out-of-band data exfiltration

October 18, 2025 9 min read

Beginner-friendly, step-by-step walkthrough for PortSwigger's lab: blind SQL injection with out-of-band data exfiltration. Learn how to trigger a Collaborator callback that leaks the administrator password, and - critically - how to prevent and detect this in real systems.

Lab: Blind SQL injection with out-of-band interaction

Lab: Blind SQL injection with out-of-band interaction

October 17, 2025 11 min read

Complete beginner-friendly walkthrough: exploit a blind SQL injection to trigger an out-of-band interaction using Burp Collaborator. Includes payloads (placeholders), Burp workflow, OAST concepts, defensive guidance, troubleshooting, and real-world context.

Lab: Blind SQL injection with time delays and information retrieval

Lab: Blind SQL injection with time delays and information retrieval

October 16, 2025 8 min read

Beginner-friendly, step-by-step walkthrough: exploit a blind SQL injection using conditional time delays (pg_sleep) via a TrackingId cookie. Includes exact payloads (placeholders), Burp Repeater & Intruder setup, optimizations, troubleshooting, detection recipes and developer remediation.

Lab: Visible error-based SQL injection

Lab: Visible error-based SQL injection

October 15, 2025 10 min read

Beginner-friendly, step-by-step walkthrough: leak sensitive data using a visible error-based SQL injection via the TrackingId cookie. Includes exact payloads (placeholders), Repeater/Intruder setup, troubleshooting, detection recipes, and developer remediation steps.

Lab: Blind SQL injection with conditional errors

Lab: Blind SQL injection with conditional errors

October 14, 2025 9 min read

Step-by-step, beginner-friendly walkthrough: exploit an error-based blind SQL injection using the TrackingId cookie. Learn how to confirm injection, trigger conditional errors to infer truth, discover password length, extract characters with Burp Intruder, and harden your app.

Lab: Blind SQL injection with conditional responses

Lab: Blind SQL injection with conditional responses

October 13, 2025 10 min read

Beginner-friendly, step-by-step walkthrough: exploit a blind SQL injection using boolean/conditional responses (TrackingId cookie). Includes exact payloads (placeholders), length discovery, character extraction with Burp Intruder, optimizations, detection recipes and developer-focused remediation.

Lab: SQL injection UNION attack - retrieving data from other tables

Lab: SQL injection UNION attack - retrieving data from other tables

October 9, 2025 9 min read

Step-by-step, beginner-friendly walkthrough: use a UNION-based SQL injection to retrieve usernames and passwords from another table, then log in as administrator. Includes exact payloads (placeholders), troubleshooting, and defensive guidance.

Lab: SQL injection vulnerability allowing login bypass

Lab: SQL injection vulnerability allowing login bypass

October 6, 2025 9 min read

Beginner-friendly, step-by-step walkthrough of PortSwigger's lab: SQL injection that allows login bypass. Includes exact request patterns (placeholders), payloads to practice in labs, real-world examples, defensive guidance and practical detection advice.

Lab Writeup: PortSwigger – 0.CL Request Smuggling

Lab Writeup: PortSwigger – 0.CL Request Smuggling

September 9, 2025 9 min read

First-person, A complete, beginner-friendly walkthrough of PortSwigger’s new 0.CL Request Smuggling lab. Includes detection techniques, exploitation methods, ERG choices, and defensive strategies.