SVG – Scalable Vector Graphics

SVG – Scalable Vector Graphics <!DOCTYPE html> <html> <body> <h1>My first SVG</h1> <svg width=”100″ height=”100″> <circle cx=”50″ cy=”50″ r=”40″ stroke=”green” stroke-width=”4″ fill=”yellow” /> Sorry, your browser does not support inline SVG. </svg> </body> </html> Output:   SVG stands for Scalable Vector Graphics. SVG defines vector-based graphics in XML format. What is SVG? SVG stands for … Read more

C++ Hello World

lcm program in c

C++ Hello World Let’s break up the following code to understand it better: Example #include <iostream> using namespace std; int main() { cout << “Hello World!”; return 0; } Example explained Line 1: #include <iostream> is a header file library that lets us work with input and output objects, such as cout (used in line 5). Header files add functionality to C++ programs. Line … Read more

PHP MySQL connector

php-mysql

PHP MySQL connector Example:  <html> <head> <title>Connecting MySQL Server</title> </head> <body> <?php $dbhost = ‘localhost:3306’; $dbuser = ‘guest’; $dbpass = ‘guest123’; $conn = mysql_connect($dbhost, $dbuser, $dbpass); if(! $conn ) { die(‘Could not connect: ‘ . mysql_error()); } echo ‘Connected successfully’; mysql_close($conn); ?> </body> </html> PHP 5 and later can work with a MySQL database using: … Read more

LOCATE() – MySQL Function

MySQL Function

LOCATE() – MySQL Function The LOCATE() function returns the position of the first occurrence of a substring in a string. If the substring is not found within the original string, this function returns 0. This function performs a case-insensitive search. LOCATE(substring, string, start) Parameter Description substring Required. The substring to search for in string string … Read more

Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities occur when an application copies user-controllable data into a memory buffer that is not sufficiently large to accommodate it. The destination buffer is overflowed, resulting in adjacent memory being overwritten with the user’s data. Depending on the nature of the vulnerability, an attacker may be able to exploit it to execute arbitrary … Read more

Technical Challenges Faced by Vulnerability Scanners

The barriers to automation described previously lead to a number of specific technical challenges that must be addressed in the creation of an effective vulnerability scanner. These challenges impinge not only upon the scanner’s ability to detect specific types of vulnerability, as already described, but also upon its ability to perform the core tasks of … Read more

Vulnerability Scanners

A number of different tools exist for performing automated vulnerability scans of web applications. These scanners have the benefit of being able to test a large amount of functionality in a relatively short time, and in a typical application are often able to identify a variety of important vulnerabilities. Web application vulnerability scanners automate several … Read more

time_to_sec MySQL function

MySQL Function

time_to_sec MySQL function The TIME_TO_SEC() function converts a time value into seconds. SELECT TIME_TO_SEC(“19:30:10”); Output: 70210 SELECT TIME_TO_SEC(“-03:30:00”); Output: -12600 PHP MySQL Program example of time_to_sec <!doctype html> <html lang=”en”> <head> <meta charset=”utf-8″> <meta name=”viewport” content=”width=device-width, initial-scale=1″> <title>example-time_to_sec-function – php mysql examples | w3resource</title> <meta name=”description” content=”PHP MySQL PDO Example”> <link rel=”stylesheet” href=”https://maxcdn.bootstrapcdn.com/bootstrap/3.3.5/css/bootstrap.min.css”> </head> <body> … Read more

Manual Request Tools

The manual request component of the integrated test suites provides the basic facility to issue a single request and view its response. Though simple, this function is often extremely beneficial when you are probing a tentative vulnerability and need to reissue the same request manually several times, tweaking elements of the request to determine the … Read more

Integrated Testing Suites

After the essential web browser, the most useful item in your toolkit when attacking a web application is an intercepting proxy. In the early days of web applications, the intercepting proxy was a standalone tool that provided the barest of possible functionality — notably the venerable Achilles proxy, which simply displayed each request and response … Read more