7 Articles

How your file uploads may get hacked?

Covering the most important file input validation techniques on the web, some attacks againts them, and highlight the importance of sanitizing data sent by the end user with a case study.

Log4j2 RCE and exploitation example (CVE-2021-44228)

Why this new Log4j vulnerability is so dangerous? Hacked step by step until remote shell.

How can feature flagging help during release and customer experiments?

Covering a couple benefits of using feature flags in development from business and technical point of view as well.

Python and IT Business Analyst courses

Finished both, good ones with fun homeworks.

Lottery code

Simplest lottery code, randomish 5 from 90 numbers.

Modifying a link after clicking

After clicking on something, it becomes something else. Schrödinger is awake.

Commonly used SQL injection attack strings

Collected my ~30 most used SQL injection query formats.