Explore tweets tagged as #SQL_injection_attack
🚨 3 critical/high FreePBX vulnerabilities disclosed CVE-2025-66039: Authentication bypass CVE-2025-61675: SQL injection CVE-2025-61678: File upload leading to RCE I've created detection scripts for these vulns: https://t.co/2dmklJha55
@Horizon3ai - https://t.co/nQOPyb6K4F
8
102
604
🚨 BUG BOUNTY TIP: SQLi Login Bypass Payloads! 🚨 A classic SQL Injection attack can completely bypass a login form if the input isn't correctly sanitized. Always test for these when looking at login/auth endpoints: The -- (or # for MySQL) comments out the rest of the query,
5
28
263
How SQL injections work, and how to protect your system from them: SQL injection is a type of attack where the attacker runs damaging SQL commands by inserting malicious SQL code into an application input field or URL. For example, imagine an app that returns all your
8
79
393
Just completed a hands-on SQL Injection analysis using Wireshark -Traced an attack from 1=1 to full DB takeover -Extracted usernames & password hashes -Learned how to stop it with secure coding https://t.co/jA245AKEJM
3
10
118
Types of Cyberattacks 1. Phishing 2. Man-in-the- Middle Attack 3. Cross-Site Scripting (XXS) 4. SQL Injection 5. DDoS Attack 6. Password Attack 7. AI Powered Attacks 8. Ransomware Attack 9. Eavesdropping Attack
11
120
470
The following graphic shows a network connection between two systems, and then a network-based attack. What type of attack is shown? A. A denial-of-service attack B. A SQL injection attack C. An on-path attack D. A directory traversal attack
5
3
19
SQL INJECTION attack impact, vectors and types
0
8
29
SQL Injection Attack explained in the simplest way ⚠️💻 Follow for more @codecraftzone
#sql #cybersecurity #websecurity #backend #codingtips #programming #developer
0
1
5
When I went to bed, franklinveaux (dot) com was under what I thought was heavy SQL injection attack. Ah HA ha ha. If only I could return to that simpler, more naive time. I woke this morning to this in my inbox, from my site morethantwo (dot) com (this goes on for pages):
1
0
1
DAY 24 of CyberOps Associate I worked on a lab where I used wireshark to analyze packets capture on an SQL Injection attack. I also moved to module 19 where I learnt about AAA,access control models, least privilege and zero trust principle. @cyberjeremiah @elormkdaniel @OnijeC
1
2
6
APPRENTICE LAB: SQL injection vulnerability allowing login bypass This lab contains a SQL injection vulnerability in the login function. To solve the lab, perform a SQL injection attack that logs in to the application as the administrator user. What you'll do: 🔸 Use Burp
2
7
64
I completed the Web Security Academy lab: SQL injection attack, querying the database type and version on Oracle @WebSecAcademy
https://t.co/hdfp1M1TsQ
1
7
90
My app servers are under SQL injection attack through the "Feedback" system. I am currently getting tons of Feedback emails with SQL injection code attached to them. I've logged in to the primary server with Claude Opus 4.5 to investigate
5
0
0
Apparently @TheRealGibiru quit Twitter sometime ago. So we'll just tell @GoDaddy directly: The name "Charlene" is a common girl's name, not a SQL injection attack.
0
0
0
I completed the Web Security Academy lab: SQL injection attack, listing the database contents on non-Oracle databases It was actually a fun lab, for every one that joined the live session @WebSecAcademy
https://t.co/VTTMr0remE
2
5
75
Just experienced my first SQL injection attack on https://t.co/JFALnhHJiU 😅 At first, I thought one of our posts had gone viral... traffic was booming.
3
1
17