Nithin 🦹‍♂️ Profile picture
Mar 27 7 tweets 2 min read Twitter logo Read on Twitter
😱 I asked ChatGPT "What are some of the unpopular SQL injection areas" and this is what it replied.

🧵👇

#bugbounty #cybersecurity #infosec #sqli
1. Error messages: Sometimes error messages can reveal important information about the application's database, such as table names or column names. An attacker can use this information to craft a SQL injection attack.
2. Search fields: Search fields are often overlooked when testing for SQL injection vulnerabilities, but they can be an easy target for attackers. In un-sanitized search queries, an attacker can inject SQL code to retrieve sensitive data from the database.
3. Cookies: Cookies can be used to store user information, and if the application uses cookies to retrieve data from the database, they could be vulnerable to SQL injection attacks.
4. HTTP headers: HTTP headers can also be manipulated to inject SQL code. For example, an attacker can inject SQL code into the "referer" header to gain access to sensitive information.
5. JSON and XML data: Applications that use JSON or XML data might be vulnerable to SQL injection attacks if the data is not properly validated or sanitized.
What are some other unpopular SQL injection areas according to you? 🤔
Share them in the comments below.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Nithin 🦹‍♂️

Nithin 🦹‍♂️ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @thebinarybot

Mar 27
☃️Bug Bounty Beginner's Roadmap☃️

Many of you have asked me how to get started at bugbounty and what are the pre-requisites to get started.

This repository contains nearly everything you need to know and can help you get started easily with a variety of resources.

#bugbounty
@techhacker98 That's a wrap!

If you enjoyed this thread:

1. Follow me @thebinarybot to get quality content on cybersecurity and bug bounty hunting.
2. RT the tweet below to share this thread with your audience
Read 4 tweets
Feb 2
Want to get started at Cybersecurity in 2023?

Worry no more. Open the thread below and master to core!

🧵👇
1. Pre-requisites

I still believe you can get into Cybersecurity without having little to no technical knowledge. That being said, if you want to master the art I would highly suggest you to learn these topics:

1. Networks
2. Operating Systems
3. Programming - Python/Bash/JS
2. Practice by doing

One of the best ways to learn is to learn by doing. Here's a list of freemium platforms where you can learn hands-on.

Generic:
1. @RealTryHackMe
2. @hackthebox_eu

Web Hacking:
1. Web Academy - rb.gy/rl5sz6
2. @PentesterLab
Read 13 tweets
Jan 31
7 GitHub profiles to star if you are into Bug Bounty.

🧵👇
1. @NahamSec 's Resources-for-Beginner-Bug-Bounty-Hunters

🔗Link: github.com/nahamsec/Resou…
2. @pentest_swissky 's PayloadsAllTheThings

🔗Link: github.com/swisskyrepo/Pa…
Read 11 tweets
Jan 7
😱 There are 137,345 Chrome extensions available for installation from the Chrome Web Store.

Here’s a list of 7 extensions you have to install right now to stay productive 💪

#productivity #growth
1. @ScribeHow

Auto-generate step-by-step guides for FREE.

Scribe saves any team 20+ hours a month with instant process documentation, complete with text and screenshots.

Link: getscribe.how/chrome
2. Momentum

Replace a new tab page with a personal dashboard to help you get focused, stay organized, and keep motivated to achieve your goals.

Link: rb.gy/lpptk9
Read 10 tweets
Jan 7
☃️OSRE Course☃️

This repository contains a fill blown Offensive Security and Reverse Engineering course and the courses covered include

➡️Reverse Engineering
➡️Bug Hunting and Fuzzing
➡️Intro to Assembly x86 and x64

and much more..

#bugbounty #fuzzing #infosec #cybersecurity
🔗 Link: github.com/ashemery/explo…

💳 Credits: @binaryz0ne
@binaryz0ne That's a wrap!

If you enjoyed this thread:

1. Follow me @thebinarybot for more of these
2. RT the tweet below to share this thread with your audience
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(