Skip to content
  • Home
  • Blog
  • Our Services
  • About
  • Contact
  • Pricing
Blog
  • Home
  • Blog
  • Our Services
  • About
  • Contact
  • Pricing
Blog
  • Ethical Hacking

Lab: Reflected XSS into HTML Context with Nothing Encoded

Vulnerability Type: Reflected Cross-Site Scripting (XSS) Attack Vector The vulnerable application reflects…

  • Adm1n
  • October 15, 2025
  • Ethical Hacking

Lab 2: Stored XSS into HTML Context with Nothing Encoded

Vulnerability Type: Stored Cross-Site Scripting (XSS) Attack Vector The vulnerable application stores…

  • Adm1n
  • October 15, 2025
  • Ethical Hacking

Lab 8: SQL injection UNION attack, finding a column containing text

Methodology Conclusion This lab highlights how a simple marker string can reveal…

  • Adm1n
  • October 8, 2025
  • Ethical Hacking

Lab 10: SQL Injection UNION Attack (Retrieving Multiple Values in a Single Column)

Attack Vector Used  Exploitation Steps Mitigation Strategies Conclusion This lab demonstrates how…

  • Adm1n
  • October 8, 2025
  • Ethical Hacking

Lab 9: SQL Injection UNION Attack (Retrieving Data from Other Tables) 

Attack Vector Used Exploitation Steps  Mitigation Strategies Conclusion  This lab demonstrates how…

  • Adm1n
  • October 8, 2025
  • Ethical Hacking

Lab 8: SQL injection UNION attack, finding a column containing text 

Introduction Lab 8 demonstrates a UNION-based SQL injection technique to identify which…

  • Adm1n
  • October 1, 2025
  • Ethical Hacking

Lab 7: SQL injection UNION attack, determining the number of columns returned by the query

Introduction Lab 7 demonstrates a practical UNION-based SQL injection technique to determine…

  • Adm1n
  • October 1, 2025
Prev
1 … 3 4 5 6 7 8 9
Next

Live Search

No results

Posts

Lab: Username Enumeration via Subtly Different Responses 

February 6, 2026

How to Secure Sensitive Data in the Cloud

August 20, 2025

Building Your Career: In-Demand Cybersecurity Skills to Learn Now

August 20, 2025

The Rise of AI-Powered Cyber Attacks: How to Stay Ahead of Hackers

August 20, 2025

Lab 5: SQL injection attack, listing the database contents on non-Oracle databases

September 24, 2025

Categories

  • Career
  • Cloud Security
  • Cyber Threats
  • Ethical Hacking
  • Uncategorized

Trending now

Lab: Username Enumeration via Subtly Different Responses 
How to Secure Sensitive Data in the Cloud
Building Your Career: In-Demand Cybersecurity Skills to Learn Now
The Rise of AI-Powered Cyber Attacks: How to Stay Ahead of Hackers

We provide innovative IT solutions and cybersecurity services to empower businesses and individuals globally

Navigation

  • Main Page
  • Privacy Policy

Contact Info

  • Address: No. 47 Kanta Road by Independence Way, Kaduna.
  • Phone: +234 7044621230
  • Email: info@apexiumtechnologies.com

Copyright © 2026 - Apexium Technologies Ltd.