Luke a Pro

Luke Sun

Developer & Marketer

🇺🇦
EN||
Common Internet Security

Common Internet Security

A practical series on common web and network attacks, how they work, and how to defend against them.

Each chapter includes a short explanation, an attack-flow diagram, and a checklist of best practices.

SQL Injection (SQLi)

An injection attack that allows an attacker to interfere with the queries an application makes to its database.

NoSQL Injection

An injection vulnerability targeting NoSQL databases by manipulating query structures or logic using malicious objects.

OS Command Injection

A critical vulnerability where an attacker executes arbitrary operating system (OS) commands on the server via vulnerable application code.

Credential Stuffing

An automated attack where stolen username/password pairs from one breach are tested against other websites.

Session Hijacking

The exploitation of a valid session control mechanism to gain unauthorized access to a user's session.

Directory Traversal

An HTTP attack which allows attackers to access restricted directories and read (or sometimes write) files outside of the web server's root directory.

Phishing Attacks

Social engineering attacks that use deceptive communications to trick victims into revealing sensitive information or installing malware.

Man-in-the-Middle (MITM) Attack

An attack where the adversary secretly intercepts and potentially alters communications between two parties who believe they are communicating directly.

Open Redirect Vulnerability

A vulnerability where a web application accepts user-controlled input to redirect users to external URLs, enabling phishing and trust abuse.

Insecure Deserialization

A vulnerability where untrusted data is used to abuse the logic of an application's deserialization process, often leading to remote code execution.

Subdomain Takeover

An attack where an attacker gains control of a subdomain by claiming abandoned cloud resources that the DNS still points to.