Tagged articles
3 articles
Page 1 of 1
Huolala Tech
Huolala Tech
Mar 18, 2025 · Information Security

Mastering MSSQL Attack Chains: Exploit Techniques and Defense Strategies

This article provides a comprehensive analysis of MSSQL attack vectors—including stored procedures, COM components, CLR, sandbox bypass, triggers, proxy jobs, Kerberoasting, and linked servers—detailing prerequisites, exploitation steps with code examples, and practical mitigation recommendations to harden database security.

Attack TechniquesCLRCOM
0 likes · 21 min read
Mastering MSSQL Attack Chains: Exploit Techniques and Defense Strategies
Efficient Ops
Efficient Ops
Dec 29, 2022 · Information Security

Mastering AD Domain Security: Attack Techniques and Defense Strategies

This article explains how Active Directory domains work, outlines over 220 attack techniques such as SPN scanning, password spraying, Kerberoasting, DCSync, and privilege‑escalation exploits, and then presents comprehensive defense measures including attack‑surface reduction, strict admin hygiene, network isolation, honeypots, and continuous monitoring.

Active DirectoryAttack TechniquesDefense Strategies
0 likes · 15 min read
Mastering AD Domain Security: Attack Techniques and Defense Strategies
Laravel Tech Community
Laravel Tech Community
Feb 6, 2022 · Information Security

Understanding and Exploiting HTTP Host Header Attacks

This article explains the purpose of the HTTP Host header, how Host header attacks arise when the header is trusted or altered, demonstrates exploitation techniques such as modifying, duplicating, or injecting alternative header fields, and provides mitigation strategies to protect web applications.

Attack TechniquesHTTP Host headerSSRF
0 likes · 19 min read
Understanding and Exploiting HTTP Host Header Attacks