How to Exploit “improper error handling” in Web Applications
In this article we’ll discuss and demonstrate how improper error handling can be exploited in Web Applications. We’ll also discuss how various types of error handling can introduce various types of attack vectors.
Security Engineer vs. Software Engineer
Security Engineer vs. Software Engineer Post Views: 171 Patreon: Premium Content Subscribe to Patreon to watch this episode. Reading Time: 5 Minutes Introduction With the world of technology evolving so quickly, a lot of career paths are born with it. Computer...
Common and Uncommon types of SQL Injection
In this article, we’ll explain some of the most common and uncommon types of SQL Injection. We’ll also discuss how these attacks can impact your company and your customers, and show you the measures you need to take to mitigate and minimize such risks.
Google Dorking: Manual and Automated Methods for finding Hidden Information
In this article, we will showcase how to effectively use Google Dorking to uncover hidden and sensitive information on websites. Google Dorking enables security researchers to proactively discover and address potentially sensitive information that might not be intended for public access.









