Skip to content
March 13, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • AI
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • 2018
  • April

Month: April 2018

  • Web Security
8 years ago

Advanced Exploitation with Sqlmap

We have learnt the basic exploitation of Sql Injection with the help of Sqlmap in our previous posts. But there is always a step further. In this post we will see most advanced exploitation with Sqlmap. Once again 3 cheers to Kunal for helping me out for this post. In our first post of Sqlmap,…

Read More
Shekhar Suman12 mins

Author Info

Shekhar Suman

Security isn't a feature. It's an architecture decision.

-----

I'm Shekhar Suman — a cybersecurity professional and trainer with over a 15 years of experience in Offensive and Defensive security. I work with organizations to harden their security architecture and with teams to build the mindset that makes it stick.

This blog is where I think out loud about the problems worth solving.

-----

All views expressed here are personal and do not reflect my employer's prospective.

Categories

  • AI
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • OT Security
  • Secure SDLC
  • Web Security

Recent Posts

  • CVE-to-OT Impact Translator – COIT
  • LANCE: An Open Source Framework for Automated Red Teaming of LLMs (2025)
  • Jailbreaking vs. Prompt Injection: Same Problem, Different Names — Or Is It?
  • End-to-End LLM Security Architecture: How All the Defenses Fit Together
  • Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm

Recent Comments

  1. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm
  2. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  3. End-to-End LLM Security Architecture: How All the Defenses Fit Together - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough
  4. Multi-Agent Prompt Injection: When One Poisoned Node Corrupts the Entire Swarm - IOSEC.IN on Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring
  5. Indirect Prompt Injection in RAG Pipelines: The Riskiest AI Threat Enterprise Teams Are Ignoring - IOSEC.IN on Prompt Injection: The Vulnerability Nobody Is Taking Seriously Enough

Archives

  • March 2026
  • February 2026
  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
iosec.in Powered By BlazeThemes.