<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Tar Wildcard Exploitation on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/tar-wildcard-exploitation/</link><description>Recent content in Tar Wildcard Exploitation on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 18 May 2025 13:07:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/tar-wildcard-exploitation/index.xml" rel="self" type="application/rss+xml"/><item><title>Cockpit Offsec Walkthrough</title><link>https://chiefdennis.github.io/posts/offsec_cockpit/</link><pubDate>Sun, 18 May 2025 13:07:16 +0100</pubDate><guid>https://chiefdennis.github.io/posts/offsec_cockpit/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/posts/offsec_cockpit/image0.png" alt="image">&lt;/p>
&lt;h2 id="introduction">
 Introduction
 &lt;a class="heading-link" href="#introduction">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;h3 id="sql-injection-vulnerability">
 SQL injection vulnerability
 &lt;a class="heading-link" href="#sql-injection-vulnerability">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h3>
&lt;p>A SQL Injection (SQLi) vulnerability is one of the most critical threatsin web applications that interact with databases. This vulnerability occurs when an application does not properly validate and sanitize user input before using it in SQL queries, allowing an attacker to manipulate these queries to access, modify, or delete data in the database.&lt;/p></description></item></channel></rss>