Site search

Search results: «SQL»

Found matches: 22

SQL Injection Attack — one of the oldest bugs, still one of the most dangerous.

SQL injection happens when user input is treated as executable SQL instead of data. A single unsafe query can expose sensitive data, bypass authentication, or even destroy entire tables.

String interpolation inside raw SQL is a red flag. It allows attackers to inject malicious logic directly into your query. Sanitizing input helps, but it is not enough on its own.

The real fix is parameterized queries.
When parameters are used correctly, the database engine treats input strictly as data — not executable code. No matter...
9 favorite websites to practice coding exercises until you're a MASTER:
9. Mode (SQL)
8. DataLemur (SQL)
7. LeetCode (Python)
6. Codewars (Python)
5. Stratascratch (SQL)
4. HackerRank (Python)
3. Kaggle (Data Science)
2. W3 Resource (pandas)
1. bnomial (Machine Learning)
SQL Injection Explained

A malicious user inputs something like:

' OR '1'='1

This input alters the SQL query:

SELECT * FROM users WHERE username='' OR '1'='1';

Because '1'='1' is always true, the query returns all rows from the users table instead of a specific user.

This allows attackers to bypass login or extract entire databases without authorization.

Prevention Tips:
✅ Always use prepared statements or parameterized queries.
✅ Sanitize and validate all user inputs.
✅ Apply least privilege principles on database access.

Stay safe and protect your database from SQL Injection attacks!
#SQLInjection #CyberSecurity #DatabaseSecurity #ProtectYourData
🔎 What is 𝐘𝐚𝐧𝐝𝐞𝐱 𝐝𝐨𝐫𝐤𝐢𝐧𝐠? (Advanced OSINT Technique)

Most bug hunters know about Google Dorks…

But very few explore the power of Yandex Dorking using Yandex 🔥

Yandex is a Russian search engine that sometimes indexes files and directories that Google ignores — making it extremely powerful for reconnaissance and OSINT.

💡 Why Yandex is Special?

✔️ Different indexing algorithm
✔️ Better exposure of open directories
✔️ Sometimes reveals sensitive files not visible on Google
✔️ Useful for bug bounty & recon

---

🎯 Common Yandex Dork Examples

⚠️ For educational & authorized testing only.

1️⃣ Find Exposed Login Pages...
A copy of Instagram (almost).

Installation: Upload the database (insta.sql) to a previously created database, Connect the database in the config.php file , or delete the config and follow the installer ( http://your_site/install.php
As a backend dev in 2026 , learn these 11 skills to keep you relevant in this Job market :

1. API Design - REST/gRPC

2. Authentication & Authorization - OAuth2, JWT, OpenID Connect, Passkeys

3. Databases - SQL, NoSQL, sharding, indexing, query tuning

4. Caching - Redis, CDN, edge caching strategies

5. Event-Driven Systems - Kafka, Pulsar, streaming pipelines

6. Concurrency & Async - reactive programming, structured concurrency

7. Distributed Systems - microservices, service mesh, eventual consistency

8. Security - HTTPS, encryption, zero trust, OWASP top 10

9. Observability - logging, tracing, metrics, OpenTelemetry

10. Cloud & Deployment -...
SQL Injection Explained

A malicious user inputs something like:

' OR '1'='1

This input alters the SQL query:

SELECT * FROM users WHERE username='' OR '1'='1';

Because '1'='1' is always true, the query returns all rows from the users table instead of a specific user.

This allows attackers to bypass login or extract entire databases without authorization.

Prevention Tips:
✅ Always use prepared statements or parameterized queries.
✅ Sanitize and validate all user inputs.
✅ Apply least privilege principles on database access.

Stay safe and protect your database from SQL Injection attacks!
#SQLInjection #CyberSecurity #DatabaseSecurity #ProtectYourData
Bard can help you write codes for services and apps as it can support 20 coding languages, including:

C++
Go
Java
JavaScript
Python
TypeScript
C
C#
R
Swift
Kotlin
PHP
HTML
CSS
SQL
Bash
Perl
Ruby
Lua
Rust
Bard can generate code, debug code, and explain code snippets. It can also help you write functions for Google Sheets. Bard is still under development, but it is a powerful tool that can help you with a variety of coding tasks. #bard #googlebard
Installation:
Open PHPMyAdmin, create a database and import hashtag.sql.
Open config/class/needy_class.php and fill in your PDO, path and email.
Open config/declare.php, config/class/needy_class.php & public/js/modules.js and replace the DIR variable containing my root path with your root path. (Note: do not add a slash at the end!).
Open .htaccess, go to line 17 and replace it with your root path.
If the "Back Time" function does not work correctly (forward or backward), go to config/class/time.class.php and play with line #8. Enjoy!!