How I exploited and fixed blind SQLi
Recon → boolean-based exfiltration → parameterized fix.
Recon → boolean-based exfiltration → parameterized fix.
Building timelines, extracting IoCs, and communicating clearly.
Simple STRIDE-style walkthroughs that actually get used.
Evolving a small CLI (like Hospital Manager) into a web UI.
Isolated networks, images, and safe targets.