Avoid “OR 1=1” in SQL Injections
Overview Despite its popularity as an SQL injection example, we argue that “OR 1=1” presents more risks than rewards. It may work for login bypasses occasionally, but its reliability is questionable, and better alternatives exist. We explore the drawbacks,...
Burp Extension Dev Part 1: Setup & Basics
Overview In this blog post series, we’ll guide you through the process of creating Burp extensions. First, we will set up your development environment. Then, we will create a basic extension to add a custom feature to Burp Suite. Over the course of the series,...
Password Managers and Guidelines: Mastering Your Passwords
Overview TCM Security is continuing the “Practical Cybersecurity Awareness” four-part series this week during Cybersecurity Awareness Month. Today we continue our four-part series with learning how to harness password managers for enhanced Digital Security. Securing...
