Skip to main content

Websec Cybersecurity Blog

Expert insights, trends, research findings, and best practices from our security team to help you strengthen your organization's security posture.

Image unavailable
Blog August 22, 2012

Solutions for challenge 2B

A detailed explanation of the SQL Injection challenge 2B and the many solutions used to solve this challenge.

Image unavailable
Blog July 14, 2012

Solutions for challenge 2A

A detailed explanation of the SQL Injection challenge 2A and the many solutions used to solve this challenge.

Image unavailable
Blog July 7, 2012

A series of SQL Injection challenges

I want to introduce three SQL Injection challenges which were created for a CTF, but have yet to be solved... Could you be the first?

Image unavailable
Blog June 11, 2012

Using Burp to exploit a Blind SQL Injection

How to use Burp Suite to automate the process of extracting information from a SQL database through a Blind SQL Injection.

Image unavailable
Image unavailable
Blog May 27, 2012

Remote credential and configuration disclosure of Huawei HG5XX devices using Nmap.

A new NSE script called "http-huawei-hg5xx-vuln" has been added to Nmap which exploits a couple of vulnerabilities found in Huawei HG5XX modems.