Skip to content
TOP MENU

Mahad Naveed

Scrambeled Ramblings of a Key Puncher

  • WriteUps
    • PortSwigger Labs
    • TryHackMe
  • Information Security
  • Technology
  • Recommendations
    • Books
    • Movies
    • TV Series
Information Security Technology

Browsers: In Terms of Cyber Threat

Mar 8, 2023 Mahad Naveed Comment on Browsers: In Terms of Cyber Threat

Introduction Browsers have become an indispensable part of our daily lives. From online shopping to social media, browsing the internet has become a routine for

Information Security Technology

Cracking the Code: The Challenges of Cryptography in the Quantum Era

Feb 18, 2023 Mahad Naveed 1 Comment on Cracking the Code: The Challenges of Cryptography in the Quantum Era

Why did the quantum computer break the code? Because it was superpositioned to crack it! Introduction Cryptography has long been used as a means of

Information Security Technology

Exploring the Dark Web: What It Is and How to Protect Yourself?

Feb 1, 2023 Mahad Naveed 1 Comment on Exploring the Dark Web: What It Is and How to Protect Yourself?

Introduction The internet has come a long way since its beginning, and with its vastness, there is always a dark side to it. The Dark

PortSwigger Labs WriteUps

PortSwigger Labs: SQL injection vulnerability allowing login bypass

Jan 31, 2023 Mahad Naveed Comment on PortSwigger Labs: SQL injection vulnerability allowing login bypass

SQL injection is a common security vulnerability that occurs when user input is not properly validated and sanitized before being used in SQL queries. In

PortSwigger Labs WriteUps

PortSwigger Labs: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

Jan 29, 2023 Mahad Naveed Comment on PortSwigger Labs: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

So this is a basic SQL Injection Lab, in this lab, we are given an e-commerce store where multiple products are listed. All of the

Information Security

Protecting a Business from Cyber Threats: Just Another Guide to Common Attack Types and Prevention Strategies

Jan 29, 2023 Mahad Naveed Comment on Protecting a Business from Cyber Threats: Just Another Guide to Common Attack Types and Prevention Strategies

Introduction In today’s digital age, cybersecurity is a critical concern for businesses and individuals alike. With the increasing number of cyberattacks, it is essential to

Information Security Technology

Browsers: In Terms of Cyber Threat

Mar 8, 2023 Mahad Naveed 0
Information Security Technology

Cracking the Code: The Challenges of Cryptography in the Quantum Era

Feb 18, 2023 Mahad Naveed 1
Information Security Technology

Exploring the Dark Web: What It Is and How to Protect Yourself?

Feb 1, 2023 Mahad Naveed 1
PortSwigger Labs WriteUps

PortSwigger Labs: SQL injection vulnerability allowing login bypass

Jan 31, 2023 Mahad Naveed 0
PortSwigger Labs WriteUps

PortSwigger Labs: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

Jan 29, 2023 Mahad Naveed 0
Information Security

Protecting a Business from Cyber Threats: Just Another Guide to Common Attack Types and Prevention Strategies

Jan 29, 2023 Mahad Naveed 0
TryHackMe WriteUps

TryHackMe – Dig Dug [Writeup/Walkthrough]

May 18, 2022 Mahad Naveed1 Comment on TryHackMe – Dig Dug [Writeup/Walkthrough]

Dig Dug is another fun little free room on TryHackMe.com where you can learn to

TryHackMe WriteUps

TryHackMe – Brute It [Writeup/Walkthrough]

Mar 8, 2022 Mahad Naveed

Brute It is an easy TryHackMe room that focuses on basic enumeration, hash-cracking and privilege

Information Security

Google Docs Comment Feature Exploit Allows for Distribution of Phishing and Malware

Jan 9, 2022 Mahad NaveedComment on Google Docs Comment Feature Exploit Allows for Distribution of Phishing and Malware

Since the beginning of December 2021, a new tendency in phishing attempts developed, with threat

Technology

How to Backup Gitlab | Manual and Automated Gitlab Backup

Sep 20, 2021 Mahad NaveedComment on How to Backup Gitlab | Manual and Automated Gitlab Backup

Why You Should Understand Gitlab Backup If you are a web developer or an open-source

Posts navigation

PrevPrevious page Page 1 Page 2

Categories

  • Information Security
  • PortSwigger Labs
  • Technology
  • TryHackMe
  • WriteUps

Recent Posts

  • Browsers: In Terms of Cyber Threat
  • Cracking the Code: The Challenges of Cryptography in the Quantum Era
  • Exploring the Dark Web: What It Is and How to Protect Yourself?
  • PortSwigger Labs: SQL injection vulnerability allowing login bypass
  • PortSwigger Labs: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

Categories

  • Information Security (8)
  • PortSwigger Labs (2)
  • Technology (7)
  • TryHackMe (3)
  • WriteUps (5)
Information Security Technology

Browsers: In Terms of Cyber Threat

Mar 8, 2023 Mahad Naveed 0
Information Security Technology

Cracking the Code: The Challenges of Cryptography in the Quantum Era

Feb 18, 2023 Mahad Naveed 1
Information Security Technology

Exploring the Dark Web: What It Is and How to Protect Yourself?

Feb 1, 2023 Mahad Naveed 1
PortSwigger Labs WriteUps

PortSwigger Labs: SQL injection vulnerability allowing login bypass

Jan 31, 2023 Mahad Naveed 0
PortSwigger Labs WriteUps

PortSwigger Labs: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data

Jan 29, 2023 Mahad Naveed 0
Information Security

Protecting a Business from Cyber Threats: Just Another Guide to Common Attack Types and Prevention Strategies

Jan 29, 2023 Mahad Naveed 0
Copyright © 2023 Bosa Blog Dark. Powered by Bosa Themes