π΄ some of the Types of Injections
ββββββββββββββ
β Depending on the type of database system, the programming language and other factors, there can be many different types of injections:
πΉ Code Injection
πΉ CRLF Injection
πΉ OS Command Injection
πΉ XSS
πΉ Email Header Injection
πΉ SQL Injection
Etc..
#share & #supportus
-------------> @geekcode π
Share as more as π€©
ββββββββββββββ
β Depending on the type of database system, the programming language and other factors, there can be many different types of injections:
πΉ Code Injection
πΉ CRLF Injection
πΉ OS Command Injection
πΉ XSS
πΉ Email Header Injection
πΉ SQL Injection
Etc..
#share & #supportus
-------------> @geekcode π
Share as more as π€©
π΅ How do you prevent code injection vulnerabilities?
β Preventing code injection vulnerabilities really depends on the technology you are using on your website. For example, if you use WordPress, you could minimize code injection vulnerabilities by keeping it to a minimum of plugin and themes installed.
πΉ If you have a tailored web application and a dedicated team of developers, you need to make sure to have security requirements your developers can follow when designing and writing software. This will allow them to keep thinking about security during the lifecycle of the project.
β οΈ Here are OWASPβs technical recommendations to prevent SQL injections:
π Preventing SQL injections requires keeping data separate from commands and queries.
πΉThe preferred option is to use a safe API, which avoids the use of the interpreter entirely or provides a parameterized interface or migrate to use Object Relational Mapping Tools (ORMs). Note: Even when parameterized, stored procedures can still introduce SQL injection if PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec().
πΉ Use positive or βwhitelistβ server-side input validation. This is not a complete defense as many applications require special characters, such as text areas or APIs for mobile applications.
πΉ For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. Note: SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report-writing software.
πΉ Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection.
#share & #supportus
-------------> @geekcode π
Share as more as π€©
β Preventing code injection vulnerabilities really depends on the technology you are using on your website. For example, if you use WordPress, you could minimize code injection vulnerabilities by keeping it to a minimum of plugin and themes installed.
πΉ If you have a tailored web application and a dedicated team of developers, you need to make sure to have security requirements your developers can follow when designing and writing software. This will allow them to keep thinking about security during the lifecycle of the project.
β οΈ Here are OWASPβs technical recommendations to prevent SQL injections:
π Preventing SQL injections requires keeping data separate from commands and queries.
πΉThe preferred option is to use a safe API, which avoids the use of the interpreter entirely or provides a parameterized interface or migrate to use Object Relational Mapping Tools (ORMs). Note: Even when parameterized, stored procedures can still introduce SQL injection if PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec().
πΉ Use positive or βwhitelistβ server-side input validation. This is not a complete defense as many applications require special characters, such as text areas or APIs for mobile applications.
πΉ For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. Note: SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report-writing software.
πΉ Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection.
#share & #supportus
-------------> @geekcode π
Share as more as π€©
π AlgoExpert All courses Free π
βͺοΈWhat is AlgoExpert?
AlgoExpert is an interview prep platform for software engineers. It's specifically geared towards those who want to work at a FAANG-level company. Featuring a robust interactive coding environment, AlgoExpert also has expansive video solutions.
SIZE : 20 GB +
Download link :
https://mega.nz/folder/qI1SEAKQ#0scBk0i_Y0dwgrlb5yehRw
#share & #supportus
-------------> @geekcode π
Share as more as π€©
βͺοΈWhat is AlgoExpert?
AlgoExpert is an interview prep platform for software engineers. It's specifically geared towards those who want to work at a FAANG-level company. Featuring a robust interactive coding environment, AlgoExpert also has expansive video solutions.
SIZE : 20 GB +
Download link :
https://mega.nz/folder/qI1SEAKQ#0scBk0i_Y0dwgrlb5yehRw
#share & #supportus
-------------> @geekcode π
Share as more as π€©
mega.nz
File folder on MEGA
Practical Web Design & Development: 7 Courses in 1
Master in Practical Web design and development using Photoshop, HTML5, CSS3, Bootstrap and more.
https://www.udemy.com/course/learn-web-design-html-css-adobe-photoshop/?couponCode=WEB7CHRISTMAS20F
#share & #supportus
-------------> @geekcode π
Share as more as π€©
Master in Practical Web design and development using Photoshop, HTML5, CSS3, Bootstrap and more.
https://www.udemy.com/course/learn-web-design-html-css-adobe-photoshop/?couponCode=WEB7CHRISTMAS20F
#share & #supportus
-------------> @geekcode π
Share as more as π€©
Udemy
Practical Web Design & Development: 7 Courses in 1
Master Practical Web Design & Development with Photoshop, HTML5, CSS3, Bootstrap, UI/UX, Responsive Design & More
#enroll
Scrum Fundamentals for Scrum Master and Agile Projects- 2020
Master the Scrum concepts necessary for Scrum Master Certification & Agile Scrum Project Management
https://www.udemy.com/course/scrum-genman/?couponCode=SCRUMNEWYR
#share & #supportus
-------------> @geekcode π
Share as more as π€©
Scrum Fundamentals for Scrum Master and Agile Projects- 2020
Master the Scrum concepts necessary for Scrum Master Certification & Agile Scrum Project Management
https://www.udemy.com/course/scrum-genman/?couponCode=SCRUMNEWYR
#share & #supportus
-------------> @geekcode π
Share as more as π€©
Udemy
Scrum Fundamentals for Scrum Master and Agile Projects
Everything you need to know to get started with Agile Scrum: Team, Events, Artifacts & Agile Project Management Concepts
#enroll
React Basics for beginners
Learn react basics from scratch with functional components and Hooks with axios.
https://www.udemy.com/course/react-basics-for-beginners/?couponCode=SHEYYYY
#share & #supportus
-------------> @geekcode π
Share as more as π€©
React Basics for beginners
Learn react basics from scratch with functional components and Hooks with axios.
https://www.udemy.com/course/react-basics-for-beginners/?couponCode=SHEYYYY
#share & #supportus
-------------> @geekcode π
Share as more as π€©
Udemy
React Basics for beginners
Learn React basics from scratch with functional components and Hooks with axios.
#enroll
Practical Cisco Networking Labs in Cisco Packet Tracer
Networking concepts explained in a simple way, with many engaging exercises!
Bestseller
https://www.udemy.com/course/practical-cisco-networking-labs/?couponCode=HAPPY2021
#share & #supportus
-------------> @geekcode π
Share as more as π€©
Practical Cisco Networking Labs in Cisco Packet Tracer
Networking concepts explained in a simple way, with many engaging exercises!
Bestseller
https://www.udemy.com/course/practical-cisco-networking-labs/?couponCode=HAPPY2021
#share & #supportus
-------------> @geekcode π
Share as more as π€©
Udemy
Practical Cisco Networking Labs in Cisco Packet Tracer
Networking concepts explained in a simple way, with many engaging exercises!
π Top 3 methods of Cracking Passwords Techniques Used By Hackers (intermediate)
βββββββββββββ
πΉ Dictionary Attack
π A dictionary attack is a technique used by most regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary consisting of usual words that many people use as their password. On Dictionary attacks, hackers attempt to crack your passwords by making random guesses.
πΉ Brute Force Attack
π Well, Brute-Force is an advanced version of Dictionary attack. In this attack, the hacker submits many passwords or passphrases with the hope of eventually guessing correctly. The attackerβs role is to systematically check all possible passwords and passphrases until the correct one is found.
πΉ Rainbow Table Attack
π Well, Rainbow Table is usually a large dictionary that contains loads of pre-calculated hashes and the passwords from which they were calculated. The major difference between Rainbow and other dictionary attacks is the Rainbow table is specially optimized for hashes and passwords.
β Thats it for intermediate hackers, I hope you got to know something about password cracking techniques
#share & #supportus
-------------> @geekcode π
Share as more as π€©
βββββββββββββ
πΉ Dictionary Attack
π A dictionary attack is a technique used by most regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary consisting of usual words that many people use as their password. On Dictionary attacks, hackers attempt to crack your passwords by making random guesses.
πΉ Brute Force Attack
π Well, Brute-Force is an advanced version of Dictionary attack. In this attack, the hacker submits many passwords or passphrases with the hope of eventually guessing correctly. The attackerβs role is to systematically check all possible passwords and passphrases until the correct one is found.
πΉ Rainbow Table Attack
π Well, Rainbow Table is usually a large dictionary that contains loads of pre-calculated hashes and the passwords from which they were calculated. The major difference between Rainbow and other dictionary attacks is the Rainbow table is specially optimized for hashes and passwords.
β Thats it for intermediate hackers, I hope you got to know something about password cracking techniques
#share & #supportus
-------------> @geekcode π
Share as more as π€©
π°Reasons why you might be facing internet issues when VPN is ONπ°
I was facing one Problem in My all Systems That I am unable to access Internet while Connected to VPN! When I googled or Searched on other websites I found some ways but none work for me But today I did some digging and found out my Mistake!
So I thought to share it here So if anyone facing this he can solve it today!
π Problems that you might face generally include issues with Proxy Settings and Other VPNsπ
Possible solution for Proxy settings errorπ
1. Click the Chrome Menu in the browser toolbar.
2. Select Settings.
3. Click Advanced.
4. In the System section, click Open your computerβs proxy settings. (For Windows 7 and Windows 8 or 8.1 users, this will open the Internet Properties window.)
5. Under Automatic proxy setup, toggle Automatic detect settings Off.
6. Under Manual proxy setup, toggle Use a proxy server Off.
7. Click Save.
Possible solution for issues with other VPNsπ
Open Your Browser Extension Settings and disable all VPNs Extension and also Delete other VPN service If you Can!
Now Try to Use Your VPN again It will surely works!π―
Unmute and pin us on top for more stuff
#share & #supportus
-------------> @geekcode π
Share as more as π€©
I was facing one Problem in My all Systems That I am unable to access Internet while Connected to VPN! When I googled or Searched on other websites I found some ways but none work for me But today I did some digging and found out my Mistake!
So I thought to share it here So if anyone facing this he can solve it today!
π Problems that you might face generally include issues with Proxy Settings and Other VPNsπ
Possible solution for Proxy settings errorπ
1. Click the Chrome Menu in the browser toolbar.
2. Select Settings.
3. Click Advanced.
4. In the System section, click Open your computerβs proxy settings. (For Windows 7 and Windows 8 or 8.1 users, this will open the Internet Properties window.)
5. Under Automatic proxy setup, toggle Automatic detect settings Off.
6. Under Manual proxy setup, toggle Use a proxy server Off.
7. Click Save.
Possible solution for issues with other VPNsπ
Open Your Browser Extension Settings and disable all VPNs Extension and also Delete other VPN service If you Can!
Now Try to Use Your VPN again It will surely works!π―
Unmute and pin us on top for more stuff
#share & #supportus
-------------> @geekcode π
Share as more as π€©