Tag

exploitation

1 views collected around this technical thread.

Laravel Tech Community
Laravel Tech Community
Nov 24, 2022 · Information Security

Comprehensive phpMyAdmin Vulnerability Exploitation Guide

This article provides an extensive overview of phpMyAdmin security weaknesses, detailing information‑gathering techniques, version detection, path discovery, multiple exploitation methods such as file writes, log manipulation, slow‑query abuse, user‑defined functions, MOF attacks, and step‑by‑step PoCs for numerous CVEs, all illustrated with concrete SQL and script examples.

CVESQL injectionexploitation
0 likes · 19 min read
Comprehensive phpMyAdmin Vulnerability Exploitation Guide
Laravel Tech Community
Laravel Tech Community
Aug 10, 2020 · Information Security

Comprehensive Penetration Testing Process, Common Vulnerabilities, Exploitation Techniques, and Security Interview Questions

This article provides a detailed walkthrough of web penetration testing steps, extensive Q&A on common vulnerabilities such as SQL injection, XSS, CSRF, SSRF, file inclusion, privilege escalation methods, mitigation strategies, and interview preparation tips for security professionals.

exploitationpenetration testingsecurity interview
0 likes · 44 min read
Comprehensive Penetration Testing Process, Common Vulnerabilities, Exploitation Techniques, and Security Interview Questions
HomeTech
HomeTech
Jun 10, 2020 · Artificial Intelligence

Exploitation & Exploration Algorithms in Recommender Systems: ε‑Greedy, UCB, and Thompson Sampling Applications

This article introduces recommender systems and the exploitation‑exploration dilemma, explains common E&E algorithms such as ε‑greedy, Upper‑Confidence‑Bound, and Thompson Sampling, and details their practical deployment for interest‑point eviction, selection, and adaptive recall count optimization in an automotive recommendation platform.

Bandit algorithmsThompson SamplingUCB
0 likes · 10 min read
Exploitation & Exploration Algorithms in Recommender Systems: ε‑Greedy, UCB, and Thompson Sampling Applications
Qunar Tech Salon
Qunar Tech Salon
May 16, 2016 · Artificial Intelligence

Improving A/B Testing with a 20‑Line Multi‑Armed Bandit Algorithm

This article explains how a simple 20‑line multi‑armed bandit implementation can replace traditional A/B testing by continuously balancing exploration and exploitation to automatically discover the most effective UI variant, reducing manual analysis and improving conversion rates.

A/B TestingMulti-armed banditexploitation
0 likes · 8 min read
Improving A/B Testing with a 20‑Line Multi‑Armed Bandit Algorithm