David Kariuki

David Kariuki (5)

MODULE 1: SQL INJECTION

Module Objectives What is SQL injection Such attacks are possible because of flaws in web applications and not because of any issues with the database or web server Why bother about SQL injection? - SQL injection can be used to implement the following 1. Authentication…

#PENTEST

Mastering Reconnaissance: The Art of Gathering Intelligence in Penetration Testing Introduction Reconnaissance in cybersecurity refers to the process of gathering intelligence on a target system, network, or individual before launching an attack. It involves collecting as much data as possible about a target before attempting…

Let's Secure the Future Together!

If you are interested in security research, collaborations, or just a great cybersecurity discussion, feel free to reach out. Let’s make the digital world safer together! In The Blog; I Dive Into ALL learning,instructions,Poc,Documentation,Research, Practicals will be posted on the Hash & Dash Blog .Which…

Who Am I 

Introduction I am a cybersecurity and security researcher with a deep passion for protecting digital landscapes from emerging threats. With a keen interest in ethical hacking, vulnerability research, forensics and security analysis, I strive to stay ahead of cyber adversaries by continuously exploring new attack…