<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>UNION on NixBytes</title>
    <link>/tags/union/</link>
    <description>Recent content in UNION on NixBytes</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 18 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="/tags/union/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Machine Spirits &amp; Malicious Queries: A SQL Injection Lab Chronicle</title>
      <link>/posts/machine-spirits--malicious-queries-a-sql-injection-lab-chronicle/</link>
      <pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate>
      <guid>/posts/machine-spirits--malicious-queries-a-sql-injection-lab-chronicle/</guid>
      <description>&lt;h2 id=&#34;machine-spirits--malicious-queries-a-sql-injection-lab-chronicle&#34;&gt;Machine Spirits &amp;amp; Malicious Queries: A SQL Injection Lab Chronicle&lt;/h2&gt;&#xA;&lt;p&gt;In the grim darkness of the modern internet, there is only… vulnerable input fields.&lt;/p&gt;&#xA;&lt;p&gt;Recently, I completed a hands-on cybersecurity lab from portswigger focused on identifying the number of columns returned by a database query using a &lt;strong&gt;UNION-based SQL Injection technique&lt;/strong&gt;. While performing the exercise, I couldn’t help but imagine the process through the lens of the techno-mystic engineers of the Adeptus Mechanicus from the universe of Warhammer 40,000.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
