Multistep SQL injection attacks: Operating principle and impact

Date: 13/06/2025

SQL injections (SQLi) are among the most popular vulnerabilities in the pentesting community. Too bad, such attacks are increasingly rare nowadays since modern security tools easily detect them. By contrast, an injection triggered when data transfer occurs between services is much more difficult to detect. This article discusses SQLi that are triggered not immediately, but somewhere in the middle of business logic.
Read full article →

Python from absolute zero. Learning to work with strings, files, and the Internet

Date: 31/05/2025

One day, Crocodile Gena and Cheburashka were asked to write an essay on the topic ’How I spent my summer.’ The problem was that the friends drank beer all summer. Gena, who can’t lie, wrote it that way, so Cheburashka had to replace some words. And since Cheburashka was a Python coder, he did this using a string function. In this article, I’ll show you how to keep up with Cheburashka and learn how to work with strings, files, and make requests to websites in Python.
Read full article →

Python from absolute zero. Learning to code without boring books

Date: 30/05/2025

If you think a hacker doesn’t need programming, you’re deeply mistaken! Yes, you can rock Kali Linux and use premade programs, copy code from forums, and blindly download scripts from GitHub. But your skill limit until you learn to write and understand code will be low. In this article, I will try to teach you the basics of programming in an accessible form. Starting from zero!
Read full article →

Custom fabrication. Reversing D-Link router firmware

Date: 02/04/2025

When you create custom firmware for routers, you often have to forge the signature so that your handmade microcode can be flushed using the stock web interface. To forge a signature, you must be familiar with the image validation procedure in the stock firmware. To get a general idea of this process, let’s reverse firmware embedded into the D-Link DIR-806A B1 router and find out how signature validation is implemented in it.
Read full article →