Top 5 most dangerous injection attacks

Injection attacks exploit a variety of vulnerabilities to deliver untrusted user input that is then executed by a web application. Let’s take a look at 5 common types of injection attacks against ...
Professionally Evil Fundamentals: Introduction

LD_PRELOAD: How to Run Code at Load Time

    Today I want to continue the series on using LD_PRELOAD.  In previous posts, we covered how to inject a shared object binary into a process, and use that to hijack a library ...
Explained: SQL injection

Explained: SQL injection

SQL injection is one of the most common attacks against businesses, with a high rate of success. So what can you do to prevent them? Categories: Business Security world Tags: breachcodedrop tableinjectionphp ...