7 Articles

How your file uploads may get hacked?

Covering the most important file input validation techniques on the web, some attacks againts them, and highlight the importance of sanitizing data sent by the end user with a case study.

Log4j2 RCE and exploitation example (CVE-2021-44228)

Why this new Log4j vulnerability is so dangerous? Hacked step by step until remote shell.

Cryptography on Stanford

Completed this course online on Coursera, how was it?

Modifying a link after clicking

After clicking on something, it becomes something else. Schrödinger is awake.

Commonly used SQL injection attack strings

Collected my ~30 most used SQL injection query formats.

Public domain resolves to

Very little, but useful trick to avoid hostfile editing all the time.

Newest scam with prepaid phone cards

Story with a pinch of nonsense.