
Tor vs. VPN vs. Proxy
What is Tor? Tor or “The Onion Router” is a service created to allow people to anonymously browse the Internet. It is a decentralized system that allows users to connect through a network of relays rather than making a direct connection. The benefit of this method is that your IP address is hidden from the sites you visit by bouncing your connection from server to server at random, in essence, losing the trail. Drawbacks: While your data is encrypted along each of the relay n
Using ProxyStrike to Detect SQL Injection
I've touched on exploiting SQL Injection in previous blog posts. I gave some tips on how to manually test inputs for sql injection, but this is a very time consuming process. There are many potential injection points in one web app, and manually identifying each is a task in itself. Surely there must be a better way of identifying these vulnerabilities. So lets answer the follow question; How do security people automate the detection of sql injection vulnerabilities in web ap
How to Bypass a Firewall/Proxy
Hey guys, today I will be showing you multiple ways on how to bypass your school security measures with a few, easy-to-follow steps. Please make sure to support my channel by liking, commenting, and subscribing! WHAT IS A FIREWALL? A firewall is a network security device that grants or rejects network access to traffic flows between an untrusted zone (e.g., the Internet) and a trusted zone (e.g., a private or corporate network). The firewall acts as the demarcation point or “