Skip to content
  • Tuesday 7th December 2021
    • Medium

    Patch The Net

    One node at a time

    • Home
    • Computer Networking
    • Linux
    • CISSP Prep
    • Posts
    • Contact

    Month: April 2021

    • Articles

    Using Gobuster to Find Hidden Web Content

    Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website […]

    View the post
    spectnullbyteApril 20, 2021April 20, 2021
    Tags: directory enumerationgobusterweb enumeration
    • Articles

    Introduction to SQL Injection

    SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten […]

    View the post
    spectnullbyteApril 9, 2021April 9, 2021
    Tags: DatabasesSQLSQL InjectionSQLi
    • Getting Started with Linux
    • Linux

    Chapter 6 – Find Files in Linux

    You should already be aware of how much a search for a file can sometimes feel like looking for a needle in a haystack. Fortunately, finding files on Linux is […]

    View the post
    spectnullbyteApril 2, 2021April 2, 2021
    Tags: findLinuxlocate

    Latest Posts

    • November 28, 2021November 28, 2021spectnullbyte

      CSRF (Cross-Site Request Forgery) Explained

    • Regular Expressions
      September 26, 2021September 26, 2021spectnullbyte

      A Quick Guide To Regular Expressions

    • XSS
      August 13, 2021August 13, 2021spectnullbyte

      Introduction to Cross-Site Scripting (XSS)

    • August 6, 2021August 6, 2021spectnullbyte

      Using THC Hydra To Brute Force Login Forms

    • Linux Privilege Escalation
      July 30, 2021July 30, 2021spectnullbyte

      Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    Newsletter

    Copyright All rights reserved - Patchthenet.com
    • Medium