Open in app
Home
Notifications
Lists
Stories

Write
Albus Security
Albus Security

Home
About

May 12

AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Sample — 2

Hi Information Security folk, I hope you liked the previous article, We completed our Sql-Exploitation Section. However, in today’s article, we’ll learn about how we’ll encounter WAf. Means, We’ll learn the bypass technique. Firstly, I will introduce myself. So, I’m Aniket Tyagi and I’m an Information Technology officer at the…

Bug Bounty Writeup

5 min read

AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Sample — 2
AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Sample — 2

Published in System Weakness

·May 1

AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Sample 2

Hello Cybersecurity folk, I hope that you liked the previous article, so here you’ll learn about basic things about SQLi, Today’s article. We’ll learn about how we’ll find SQLi, exploit it, and where we inject our malicious query to retrieve data from the database with the help of SQLi. Firstly…

Bug Bounty

12 min read

AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Part 2
AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Part 2

Apr 23

AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Sample 1

Hello Cybersecurity folk, I hope that you liked the previous series of Cross-Site-Scripting(XSS), On that series of articles, you’ll learn about Basic-XSS-technique, Dom-XSS, and XSS bypass technique. Now I’ll start a series of articles on SQL injection in which you’ll about SQLi, exploitation, and bypass tricks. Firstly, I will introduce…

Bug Bounty Program

4 min read

AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Part 1
AlbusSec:- Penetration-List 06 SQL Injection (SQLi) — Part 1

Apr 3

Albus Security Trainee Application

Hi Medium folk, before We start I'll introduce myself, So I’m Aniket Tyagi and I’m an Information Technology officer at the 5f eco foundation of India, an Information Security Researcher, and the founder of Albus Security. Today I’ll discuss something different instead of Vulnerabilities, In this article, I would like…

Bug Bounty

2 min read

Albus Security Trainee Application
Albus Security Trainee Application

Apr 1

AlbusSec:- Penetration-List 05 Cross-Site-Scripting (XSS) — Part 2

Hello Everyone, I hope you liked our previous article that was Cross-Site-Scripting (XSS) — Part 1, On that article, you learned about Basic XSS, a short summary of types of XSS, and the impact of XSS, However In this article, you’ll learn the depth summary about types of XSS. …

Bug Bounty

4 min read

AlbusSec:- Penetration-List 05 Cross-Site-Scripting (XSS) — Part 2
AlbusSec:- Penetration-List 05 Cross-Site-Scripting (XSS) — Part 2

Mar 25

Introduction To Penetration-List

Hello Everyone, Today I’ll describe my project which is Penetration-list, that is why I’m making this article and we’ll learn many vulnerabilities on this. Firstly, I will introduce myself. …

Bugbounty Writeup

2 min read

Introduction To Penetration-List
Introduction To Penetration-List

Mar 16

AlbusSec:- Penetration-List 05 Cross-Site-Scripting (XSS) — Part 1

Hello Members, I hope that you liked the previous article that is File-Inclusion. Therefore, I worked hard to complete Penetration-list Project as soon as possible. Firstly, I will introduce myself. So, I’m Aniket Tyagi and I’m an Information Technology officer at the 5f eco foundation of India, Information Security Researcher…

Bug Bounty

4 min read

AlbusSec:- Penetration-List 05 Cross-Site-Scripting (XSS) — Part 1
AlbusSec:- Penetration-List 05 Cross-Site-Scripting (XSS) — Part 1

Feb 28

AlbusSec:- Penetration-List 04 File Inclusion — Part 1

Hello Members, I hope that you liked Penetration-List Project, Therefore, I worked hard to complete Penetration-list Project. Firstly, I will introduce myself. So, I’m Aniket Tyagi and I’m an Information Technology officer at the 5f eco foundation of India, Information Security Researcher, and founder of Albus Security. …

Real World Bug Hunting

3 min read

AlbusSec:- Penetration-List 04 File Inclusion — Part 1
AlbusSec:- Penetration-List 04 File Inclusion — Part 1

Feb 18

AlbusSec:- Penetration-List 03 Open-Redirection

Hello Listeners! I hope you liked my previous articles and Also I hope that you will like My upcoming article. Today, We will learn Open-Redirection Vulnerability. Firstly, I will introduce myself. So, I’m Aniket Tyagi and I’m an Information Technology officer at the 5f eco foundation of India and founder…

Bughunting

4 min read

AlbusSec:- Penetration-List 03 Open-Redirection
AlbusSec:- Penetration-List 03 Open-Redirection

Jan 31

AlbusSec:- Penetration-list 02 File Upload Vulnerability— Part-2

Again Hi, Without wasting time We will jump into our topic for today article Overall, We will learn Remote code execution and also Cross-Site Scripting via file upload, If you have not read our part-1 then please see that article because that article contains basic things about file upload vulnerability…

8 min read

AlbusSec:- Penetration-list 02 File Upload Vulnerability— Part-2
AlbusSec:- Penetration-list 02 File Upload Vulnerability— Part-2
Albus Security

Albus Security

Privacy Is The Best Freedom

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable