
SQL Injection (SQLi) Vulnerabilities
This note covers SQL Injection (SQLi) and its practical exploitation through PortSwigger labs. It explains how unsanitized user input can manipulate backend SQL queries, enabling attackers to bypas...

This note covers SQL Injection (SQLi) and its practical exploitation through PortSwigger labs. It explains how unsanitized user input can manipulate backend SQL queries, enabling attackers to bypas...

Authentication vulnerabilities are weaknesses in the login or identity-verification process that allow attackers to impersonate users, access sensitive data, or break into systems. These flaws make...

Disclaimer This writeup is for education purpose only. The University target has been anonymized and no data was leaked. This is the story of everything about my first hack, which I discovered tw...