<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Sqli &amp; RCE on Hello w3nch</title><link>https://w3nch.github.io/categories/sqli--rce/</link><description>Recent content in Sqli &amp; RCE on Hello w3nch</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Thu, 29 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://w3nch.github.io/categories/sqli--rce/index.xml" rel="self" type="application/rss+xml"/><item><title>SOC127 Case Study: Successful SQL Injection Attack via Automated Tooling</title><link>https://w3nch.github.io/writeups/letsdefend/alerts/soc127-case-study-successful-sql-injection-attack-via-automated-tooling/</link><pubDate>Thu, 29 Jan 2026 00:00:00 +0000</pubDate><guid>https://w3nch.github.io/writeups/letsdefend/alerts/soc127-case-study-successful-sql-injection-attack-via-automated-tooling/</guid><description>Alert Name: SOC127 – SQL Injection Detected
Severity: High
Event ID: 235
Event Time: Mar 07, 2024 – 12:51 PM
Category: Web Application Attack
Platform: LetsDefend SOC
This incident shows how someone on the internet tried to trick a website into giving out information it wasn’t supposed to. Instead of breaking in directly, the attacker sent specially crafted messages to the website to see how it would respond.
Even though the website replied with “everything is OK,” it was actually doing things it shouldn’t have in the background.</description></item></channel></rss>