Luke a Pro

Luke Sun

Developer & Marketer

🇺🇦
EN||
Common Internet Security

Common Internet Security

A practical series on common web and network attacks, how they work, and how to defend against them.

Each chapter includes a short explanation, an attack-flow diagram, and a checklist of best practices.

SQL Injection (SQLi)

Published: Sat Feb 01 2025
An injection attack that allows an attacker to interfere with the queries an application makes to its database.

NoSQL Injection

Published: Sat Feb 01 2025
An injection vulnerability targeting NoSQL databases by manipulating query structures or logic using malicious objects.

OS Command Injection

Published: Sat Feb 01 2025
A critical vulnerability where an attacker executes arbitrary operating system (OS) commands on the server via vulnerable application code.

Credential Stuffing

Published: Sat Feb 01 2025
An automated attack where stolen username/password pairs from one breach are tested against other websites.

Session Hijacking

Published: Sat Feb 01 2025
The exploitation of a valid session control mechanism to gain unauthorized access to a user's session.

Directory Traversal

Published: Sat Feb 01 2025
An HTTP attack which allows attackers to access restricted directories and read (or sometimes write) files outside of the web server's root directory.