Avoid “OR 1=1” in SQL Injections
Overview Despite its popularity as an SQL injection example, we argue that “OR 1=1” presents more risks than rewards. It may work for login bypasses occasionally, but its reliability is questionable, and better alternatives exist. We explore the drawbacks,...
Burp Extension Dev Part 1: Setup & Basics
Overview In this blog post series, we’ll guide you through the process of creating Burp extensions. First, we will set up your development environment. Then, we will create a basic extension to add a custom feature to Burp Suite. Over the course of the series,...
The Practical Web Pentest Associate (PWPA) Exam
Overview The demand for skilled web application penetration testers is still ever-increasing and we are proud to introduce the Practical Web Pentest Associate (PWPA) certification. This certification is designed to validate the skills of aspiring web application...
A Beginner’s Guide to JSON
Overview JSON permeates virtually every corner of the digital landscape today. It powers web APIs, configures files, fuels mobile apps, and anchors data storage. To maintain seamless day-to-day hacking, it’s crucial to wield a robust understanding of JSON....
