Skip to content
February 5, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
    • Contact Us
    • Privacy Policy
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cyber Security
    • Cryptography
    • Cloud Security
  • Blog
Newsletter
Random News
  • Home
  • Injection

Tag: Injection

  • Web Security
8 years ago

Sqlmap tutorial for beginners – hacking with sql injection

As I discussed in my previous post that we can exploit Union Based SQL Injection with the help of manual SQL queries. now we will do the same exercise with a Python based tool SQLMAP. Note:- This tutorial is being carried out on demo test site provided by ACUNETIX, You can also try on the same website. Sqlmap…

Read More
Shekhar Suman11 mins
  • Operating System
  • Web Security
8 years ago

OS Command Injection : Simple yet effective

What is OS Command Injection OS Command Injection is a vulnerability which describes improper neutralization of special elements. It can result in modification of the intended OS command that is sent to a downstream component. So, OS command injection weaknesses can expose an environment to an attacker even if he does not have direct access…

Read More
Shekhar Suman42 mins

Author Info

Shekhar Suman

He specializes in secure software engineering, helping teams integrate security across the SDLC. His work includes application security assessments, threat modeling, penetration testing, and security architecture, with an emphasis on risk-driven design and long-term resilience.
-----
All the views expressed here is his personal and doesn't necessarily resonate with his professional role.

Categories

  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • Secure SDLC
  • Web Security

Recent Posts

  • Failure of Secure SDLC: Why Vulnerabilities Still Ship
  • Passing GIAC Security Leadership (GSLC) Exam
  • CSSLP: A Journey of Relearning How Security Should Be Built
  • Dissecting Akira Ransomware: Techniques, Payloads, and Lessons Learned
  • Ransomware 101: Understanding the Threat

Recent Comments

  1. Passing GIAC Security Leadership (GSLC) Exam - IOSEC.IN on CSSLP: A Journey of Relearning How Security Should Be Built
  2. Akira Ransomware: Techniques, Payloads on Ransomware 101: Understanding the Threat
  3. Insecure Deserialization in .NET: Risk and Fixing Legacy Code - iosec.in on Insecure Deserialization: A Silent Killer in Modern Applications
  4. un on Form based SQL Injection with Sqlmap
  5. Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !! – iosec.in on CSV Macro Injection

Archives

  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014

Categories

  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • Secure SDLC
  • Web Security
iosec.in Powered By BlazeThemes.