Skip to content
January 27, 2026

IOSEC.IN

Ideas, Observations & Stories in Cybersecurity

  • About Me
  • Web Security
    • Install Sqlmap on Windows
    • OS Command Injection : Simple yet effective
    • Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !!
    • CSV Macro Injection
    • SQL Injection- Not a Cup of Cake
  • Operating System
    • Linux
  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Blog
Newsletter
Random News
  • Home
  • shell

Tag: shell

  • Web Security
8 years ago

Advanced Exploitation with Sqlmap

We have learnt the basic exploitation of Sql Injection with the help of Sqlmap in our previous posts. But there is always a step further. In this post we will see most advanced exploitation with Sqlmap. Once again 3 cheers to Kunal for helping me out for this post. In our first post of Sqlmap,…

Read More
Shekhar Suman12 mins

Author Info

Shekhar Suman

He specializes in secure software engineering, helping teams integrate security across the SDLC. His work includes application security assessments, threat modeling, penetration testing, and security architecture, with an emphasis on risk-driven design and long-term resilience.
-----
All the views expressed here is his personal and doesn't necessarily resonate with his professional role.

Categories

  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • Secure SDLC
  • Web Security

Recent Posts

  • Failure of Secure SDLC: Why Vulnerabilities Still Ship
  • Passing GIAC Security Leadership (GSLC) Exam
  • CSSLP: A Journey of Relearning How Security Should Be Built
  • Dissecting Akira Ransomware: Techniques, Payloads, and Lessons Learned
  • Ransomware 101: Understanding the Threat

Recent Comments

  1. Passing GIAC Security Leadership (GSLC) Exam - IOSEC.IN on CSSLP: A Journey of Relearning How Security Should Be Built
  2. Akira Ransomware: Techniques, Payloads on Ransomware 101: Understanding the Threat
  3. Insecure Deserialization in .NET: Risk and Fixing Legacy Code - iosec.in on Insecure Deserialization: A Silent Killer in Modern Applications
  4. un on Form based SQL Injection with Sqlmap
  5. Back Refresh Attack Vulnerability on QualysGuard- Your browser’s back button can do more than you think !! – iosec.in on CSV Macro Injection

Archives

  • January 2026
  • August 2025
  • February 2024
  • January 2024
  • November 2021
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • May 2017
  • January 2017
  • December 2016
  • March 2016
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014

Categories

  • Certification
  • Cloud Security
  • Cryptography
  • Cyber Security
  • Linux
  • Mobile Application Security
  • Operating System
  • Secure SDLC
  • Web Security
Digital Newspaper - Multipurpose News WordPress Theme 2026. Powered By BlazeThemes.