1. Follow me @thebinarybot to get quality content on cybersecurity and bug bounty hunting. 2. RT the tweet below to share this thread with your audience
1. Error messages: Sometimes error messages can reveal important information about the application's database, such as table names or column names. An attacker can use this information to craft a SQL injection attack.
2. Search fields: Search fields are often overlooked when testing for SQL injection vulnerabilities, but they can be an easy target for attackers. In un-sanitized search queries, an attacker can inject SQL code to retrieve sensitive data from the database.
Worry no more. Open the thread below and master to core!
🧵👇
1. Pre-requisites
I still believe you can get into Cybersecurity without having little to no technical knowledge. That being said, if you want to master the art I would highly suggest you to learn these topics:
1. Networks 2. Operating Systems 3. Programming - Python/Bash/JS
2. Practice by doing
One of the best ways to learn is to learn by doing. Here's a list of freemium platforms where you can learn hands-on.