How exactly works this SQL injection example related to the DVWA application?

I am a software developer converting do application security and I have some doubts about SQL injection example.

I am following a tutorial related the famous DVWA: http://www.dvwa.co.uk/

So I have the following doubt (proba… Continue reading How exactly works this SQL injection example related to the DVWA application?

Why does the file "shell.php.jpg" can execute as a php file but "shell.jpg" cannot?

I am learning about file upload vulnerabilities using DVWA.

After cranking the website’s security level to High,
the website checks both the post request’s content type & file extension, so in order to bypass it I change… Continue reading Why does the file "shell.php.jpg" can execute as a php file but "shell.jpg" cannot?

Bypassing htmlspecialchars() for XSS (Reflected) and using an event handler is not an option in this case

I am trying to bypass high security XSS on DVWA. So the vulnerable code(I highly doubt that is it really vulnerable?) is:-

<?php

if(!array_key_exists (“name”, $_GET) || $_GET[‘name’] == NULL || $_GET[‘name’] == ”){

$isempty = tru… Continue reading Bypassing htmlspecialchars() for XSS (Reflected) and using an event handler is not an option in this case