Skip to content
  • Tuesday 25th January 2022
    • Medium

    Patch The Net

    One node at a time

    • Home
    • Computer Networking
    • Linux
    • CISSP Prep
    • Posts
    • Contact

    Category: Articles

    • Articles

    HTTP Request Smuggling Explained

    HTTP Request Smuggling (HRS) is a type of attack that is gaining more and more attention in recent years. Its rise is fueled by the high prevalence of Cloud-based applications […]

    View the post
    spectnullbyteDecember 31, 2021December 31, 2021
    Tags: HRS AttackHTTP Request SmugglingHTTP Smuggling
    • Articles

    XXE Attacks Explained

    Out of the many attacks that threaten web applications today, XXE remains the one that is talked about the least. Although it gets far less attention than XSS or SQL […]

    View the post
    spectnullbyteDecember 12, 2021December 12, 2021
    Tags: XML eXternal EntitiesXXEXXE AttackXXE Vulnerability
    • Articles

    CSRF (Cross-Site Request Forgery) Explained

    Cross-Site Request Forgery (CSRF or XSRF), also called Client-Side Request Forgery, is a type of attack that targets web applications. It allows an attacker to induce users into accessing and […]

    View the post
    spectnullbyteNovember 28, 2021November 28, 2021
    Tags: client-side request forgerycross-site request forgerycsrfcsrf attack
    • Articles

    A Quick Guide To Regular Expressions

    Regular expressions are present in almost all programming languages (Python, PHP, Javascript…), as well as in Linux commands (grep, sed…) and in many other high-level languages and applications. So, why […]

    View the post
    spectnullbyteSeptember 26, 2021September 26, 2021
    Tags: regexregular expressionRegular expressions
    • Articles

    Introduction to Cross-Site Scripting (XSS)

    This article presents a great introduction for anyone trying to learn about Cross-Site Scripting (or XSS). You don’t need to be an expert to follow along. However, you do need […]

    View the post
    spectnullbyteAugust 13, 2021August 13, 2021
    Tags: cross site scriptingpersistent xssreflected xssweb application hackingxss
    • Articles

    Using THC Hydra To Brute Force Login Forms

    THC Hydra is a powerful tool to use against login forms. It can perform brute force and dictionary attacks against different types of applications and services. When a web application […]

    View the post
    spectnullbyteAugust 6, 2021August 6, 2021
    Tags: brute forcedictionary attackHackingthc hydra
    • Articles

    Linux Privilege Escalation: Three Easy Ways to Get a Root Shell

    Once you’ve gained access to a Linux system, the next logical step is to perform privilege escalation. That is, to go from a user account with limited privileges to a […]

    View the post
    spectnullbyteJuly 30, 2021July 30, 2021
    Tags: LinuxPrivilege Escalationroot
    • Articles

    Using John The Ripper To Crack Password Hashes

    Every self-respecting pentester should have a powerful password cracker in their toolkit, and John the Ripper is simply the best cracker out there. Initially released in 1996 by Openwall, John […]

    View the post
    spectnullbyteJune 29, 2021June 29, 2021
    Tags: john crackerjohn the ripperpassword cracking
    • Articles

    Using Gobuster to Find Hidden Web Content

    Directories and Files enumeration is one of the first steps that an attacker performs during web application pentesting. This step is necessary to identify potential hidden areas of a website […]

    View the post
    spectnullbyteApril 20, 2021April 20, 2021
    Tags: directory enumerationgobusterweb enumeration
    • Articles

    Introduction to SQL Injection

    SQL injection is often referenced as the most common type of attack on websites. It is being used extensively by hackers and pen-testers on web applications. The OWASP Top Ten […]

    View the post
    spectnullbyteApril 9, 2021April 9, 2021
    Tags: DatabasesSQLSQL InjectionSQLi

    Posts navigation

    1 2

    Latest Posts

    • http request smuggling attack
      December 31, 2021December 31, 2021spectnullbyte

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 12, 2021spectnullbyte

      XXE Attacks Explained

    • November 28, 2021November 28, 2021spectnullbyte

      CSRF (Cross-Site Request Forgery) Explained

    • Regular Expressions
      September 26, 2021September 26, 2021spectnullbyte

      A Quick Guide To Regular Expressions

    • XSS
      August 13, 2021August 13, 2021spectnullbyte

      Introduction to Cross-Site Scripting (XSS)

    Newsletter

    Copyright All rights reserved - Patchthenet.com
    • Medium