Hacking Ubuntu Linux distro exploiting the CrashDB code injection issue

The exploitation of the CrashDB code injection issue could allow an attacker to remotely execute arbitrary code on machines running Ubuntu Linux distro. New problems for Ubuntu Linux distribution, the security expert Donncha O’Cearbhaill discovered a critical vulnerability that could be exploited by a remote attacker to compromise a target computer using a malicious file. The vulnerability, a […]

Here is How Hackers Perform a SQL Injection Attack

A “SQL injection” (SQLI) attack is an exploit that takes advantage of poor web development techniques and, typically combined with, faulty database security. The result of a successful attack can range from impersonating a user account to a complete compromise of the respective database or server. Unlike a DDoS attack, an SQLI attack is completely […]

Exploiting Python Code Injection in Web Applications

A web application vulnerable to Python code injection allows you to send Python code though the application to the Python interpreter on the target server. If you can execute python, you can likely call operating system commands. If you can run operating system commands, you can read/write files that you have access to, and potentially […]

AtomBombing; An Injection Code that Infects Multiple Processes in Windows

Security Researchers Discover AtomBombing — An Injection Code that Infects Multiple Processes in Windows leading to malware installation. Ensilo’s security researchers have identified a unique method that allows injection of malicious code into multiple processes without getting identified by any endpoint security system or antivirus software. This method has been labeled as AtomBombing It has […]

AtomBombing: Brand New Code Injection for Windows

TL;DR Here’s a new code injection technique, dubbed AtomBombing, which exploits Windows atom tables and Async Procedure Calls (APC). Currently, this technique goes undetected by common security solutions that focus on preventing infiltration. Code injection has been a strong weapon in the hacker’s arsenal for many years. For background on code injection and its various […]

BBQSQL – A Blind SQL Injection Exploitation Tool

BBQSQL is a blind SQL injection framework written in Python. It is extremely useful when attacking tricky SQL injection vulnerabilities. BBQSQL is also a semi-automatic tool, allowing quite a bit of customization for those hard to trigger SQL injection findings. The tool is built to be database agnostic and is extremely versatile. It also has […]

SQL Injection zero-day in component ja-k2-filter-and-search of Joomla

Information Security experts have discovered an SQL injection zero-day vulnerability in Joomla component ja-k2-filter-and-search. Information Security Researchers Dimitrios Roussis and Evangelos Apostoloudis have discovered an SQL injection vulnerability in component ja-k2-filter-and-search(https://www.joomlart.com/joomla/extensions/ja-k2-search) of Joomla, a popular open-source Content Management System (CMS). This component has been used in various Joomla sites. Through the use of the sqlmap […]

Everything about the CSV Excel Macro Injection

CSV Excel Macro Injection also known as Formula Injection or  CSV Injection is an attack technique used in the day today penetration testing of the application. CSV injection is a vulnerability which affects those  applications which has the functionality to export spreadsheets that are dynamically generated from invalidated or unfiltered user inputs Modern web applications  […]

Navis WebAccess app used by US Ports is affected by a SQL injection flaw

The Navis WebAccess application used in the transportation sector worldwide is affected by a high severity SQL injection vulnerability. A software used in the US ports is affected by a high severity SQL Injection vulnerability (CVE-2016-5817). The flaw was discovered by a hacker behind the online moniker “bRpsd,” the expert has discovered the vulnerability in […]

Learn SQL Injection with Practical example!!

What is a SQL Injection? Full form of SQL is Structured Query Language. It is used to retrieve and manipulate data in the database. SQL Injection is an attack that poisons dynamic SQL statements to comment out certain parts of the statement or appending a condition that will always be true. How SQL Injection Works […]

Advisory: HTTP Header Injection in Python urllib

Python’s built-in URL library (“urllib2” in 2.x and “urllib” in 3.x) is vulnerable to protocol stream injection attacks (a.k.a. “smuggling” attacks) via the http scheme. If an attacker could convince a Python application using this library to fetch an arbitrary URL, or fetch a resource from a malicious web server, then these injections could allow […]

MongoDB security – Injection attacks with php

Before we move on to the MongoDb injections, we must understand what MongoDb exactly is and why we prefer it over other databases. As MongoDb does not use SQL people assumed it is not vulnerable to any kind of injection attacks. But believe me, no one is born with inbuilt security aspects. We have to […]

SQL Injection Flaw: Hardcore Fetish Forum Hacked, 100k Users’ Data Leaked

The Rosebutt Board (NSFW forum) has faced a massive data breach — The leaked data also includes .gov emails — If you are at work don’t search for this forum! Last month HackRead reported how a simple SQL vulnerability allowed hackers to steal email addresses, names, IP addresses, physical addresses and plain text passwords of […]

SQL injection bug found in PanamaPapers Law Firm Mossack Fonseca

A hacker by the name, 1×0123, has revealed he found a flaw in the Panamanian tax company, Mossack Fonseca, which was involved in the #PanamaPapers leak of last week. The hacker who found the SQL bug on Saturday might be too late for the Panamanian firm, which is busy handling the aftermath of the offshore […]

SQL Injection Allowed Hacker to Steal Data of 237,000 Users from Adult Site

Over 237,000 pornographic Network Users data Stolen and Exposed on Dark Web After pornographic Website Hack — “Poor Practices” of  adult Network irked hacker so much that he hacked the website and placed user data on the Dark Web. Team Skeet adult website got hacked after a hacker obtained access to its administrative functions. After […]

Faithless Website Breached via SQL Injection, Fans Data Stolen

Data for 18,000 users stolen in the incident. The website of the Faithless British EDM band has been breached and the personal information of over 18,000 fans stolen by a yet unknown assailant,The Independent reports after being notified by cyber-security vendor CyberInt. Last September, CyberInt security experts discovered a listing on the Dark Web containing a database […]

Black Hat SEO Campaign Leverages SQL Injections to Boost Search Rankings

A new type of black hat SEO campaign has been uncovered in the last few months by Akamai’s experts, who have observed that an attacker is using SQL injection flaws to deface websites with hidden content, specifically aimed at improving his website’s SEO ranking. The campaign has targeted around 3,800 different websites, hosted on 348 […]

Critical Medical Equipment Vulnerable to LDAP and SQL Injection Attacks

Attackers can bypass authentication and access patient data. CERT/CC sounded the alarm on users of the Cardio Server ECG Management System, a broad-scope healthcare data management system used in many medical units, from small clinics to large city hospitals. The Epiphany Cardio Server is a self-hosted Web application that provides a centralized data management system for […]

How An SQL Injection Attack Works: Infographic

Short Bytes: Just like DDoS attacks, SQL injection attacks too are pretty infamous in the internet world. They are responsible for about 27% of the total online attacks and thus they demand your attention. Read more to know different aspects and how an SQL injection attack works. SQL injection attacks are one of the most […]

Joomla Update Patches Critical SQL Injection Vulnerability

Joomla on Thursday released a new version of its content management system, 3,4,5, that addresses a critical SQL injection vulnerability that could have let attackers gain access to data in the backend of any site running on the platform. The bug existed in versions 3.2 to 4.4.4 of the CMS, and would have to be combined […]