AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks

300 word summary: AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. Provides a valuable background section on the countermeasures for SQL injection attacks: Defensive ProgrammingGeneral Techniques against SQLiStatic Analysis techniques Provides examples of SQL injection attacks, with sql code.Provides a definition of an sql injection attack: “An SQL Injection Attack Read more…

Kali linux nethunter on unrooted android – rootless nethunter!

I recently saw this tweet from kali linux https://twitter.com/kalilinux/status/1209615382224547840?s=19 on installing rootless nethunter on an unrooted android device. This is my attempt to do so. The tweet linked here: https://www.kali.org/docs/nethunter/nethunter-rootless/ The instructions are pretty easy to follow Install the NetHunter-Store app from https://store.nethunter.com I had to enable install from this source Read more…

MSc Thesis

Ive completed my MSc Thesis! I was awarded a grade A (81%) and an MSc with distinction :D The abstract from my thesis is below: SQL injection vulnerabilities remain one of the top ten most critical web-application security risks. SQL injection itself is a well understood subject. There are many Read more…

Plecost tutorial

This is a basic plecost tutorial. Plecost is a commandline utility that will scan your wordpress host and identify lots of information leaks that could potentially help crackers breaking in to your site. There is some information at iniqua labs, but its a little difficult to get to grips with. Read more…