top of page
Search


From Install to Injection: Hands-on SQLMap Tutorial on Linux
Disclaimer : This blog is strictly for educational and authorized security testing only. Always take written permission before testing any application. Unauthorized testing is illegal. Introduction SQL Injection is still one of the most common and dangerous web vulnerabilities. Even today, many internal tools, admin panels, and legacy applications are exposed due to weak input validation. sqlmap is an open-source penetration testing tool that automates the process of detect

Siddhesh Kadam
3 min read


Understanding MySQL Triggers
Introduction to MySQL Triggers In the realm of database management, automation is key to maintaining data integrity and enforcing...

Siddhesh Kadam
3 min read


Different Types of SQL Commands and Their Uses
SQL commands can be broadly categorised into several types based on their functionality and purpose in interacting with databases. Here...

Siddhesh Kadam
2 min read


How to Create a User in MongoDB using db.createUser() Method
To create a user in MongoDB, you can use the db.createUser() method. Here is the basic syntax: test> use builddevops switched to db...

Siddhesh Kadam
1 min read


MongoDB Roles
MongoDB provides several built-in roles that you can assign to users to control their access to databases and operations. Here's an...

Siddhesh Kadam
2 min read


MongoDB Monitoring
MongoDB provides various commands and tools for monitoring the health and performance of your database. These commands help you gather...

Siddhesh Kadam
3 min read


MongoDB Backup & Restoration
MongoDB backup and restoration are crucial tasks for ensuring data integrity, disaster recovery, and system stability. MongoDB provides...

Siddhesh Kadam
3 min read
bottom of page
