Multistep SQL injection attacks: Operating principle and impact

Date: 13/06/2025

SQL injections (SQLi) are among the most popular vulnerabilities in the pentesting community. Too bad, such attacks are increasingly rare nowadays since modern security tools easily detect them. By contrast, an injection triggered when data transfer occurs between services is much more difficult to detect. This article discusses SQLi that are triggered not immediately, but somewhere in the middle of business logic.
Read full article →

Console Android. 50 ADB Commands Everyone Should Know

Date: 04/06/2025

There are many tools available for working with a smartphone connected via USB cable or Wi-Fi. Advanced tools allow you to move files, install and uninstall software, view contacts, take screenshots, and even send SMS, but no graphical tool can match the power that the Android console can provide. In this article, we will talk about ADB (Android Debug Bridge) – a standard tool for debugging and working with the Android console from a computer.
Read full article →

We cover our tracks. How to make Windows forget everything

Date: 04/06/2025

Lists of open files and USB devices, browser history, DNS cache – all this helps to find out what the user was doing. We have compiled step-by-step instructions on how to remove traces of your activity in different versions of Windows, Office and popular browsers. At the end of the article you will find several scripts that will help you automatically keep your machine clean.
Read full article →