<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 23 May 2026 01:12:52 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/hardcoding/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[How I could have pwned my highschool (SQLi, CSRF, Hardcoded Passwords & XSS) Part 2: Investigating the Breach]]></title><description><![CDATA[Honestly, this is a blog title I’ve never expected to write, but hey, data breaches happen – no website is exempt from that. I will begin with a little bit of a backstory: I’ve found flaws in a website]]></description><link>http://direct.ecency.com/hardcoding/@cryptonvester/how-i-could-have-pwned-my-highschool-sqli-csrf-hardcoded-passwords-and-xss-part-2-investigating-the-breach</link><guid isPermaLink="true">http://direct.ecency.com/hardcoding/@cryptonvester/how-i-could-have-pwned-my-highschool-sqli-csrf-hardcoded-passwords-and-xss-part-2-investigating-the-breach</guid><category><![CDATA[hardcoding]]></category><dc:creator><![CDATA[cryptonvester]]></dc:creator><pubDate>Mon, 21 May 2018 17:07:18 GMT</pubDate><enclosure url="https://i.ecency.com/p/2gsjgna1uruvUuS7ndh9YqVwYGPLVszbFLwwpAYXZ1eDtLq7zh9LFrWNv4Z4rksNWzdXvcxGtVZF7V2EHPKL5LWQu6W33AMq6SqrdZ7Nse31TTFj2v?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[First blog post: How I could have pwned my highschool (SQLi, CSRF, Hardcoded Passwords & XSS)]]></title><description><![CDATA[Introduction It happened. Someone told me a website was invulnerable. Coincidentally, since it also happened to belong to a highschool, I took it as a challenge, obtained permission to find flaws in it]]></description><link>http://direct.ecency.com/hacking/@cryptonvester/first-blog-post-how-i-could-have-pwned-my-highschool-sqli-csrf-hardcoded-passwords-and-xss</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@cryptonvester/first-blog-post-how-i-could-have-pwned-my-highschool-sqli-csrf-hardcoded-passwords-and-xss</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[cryptonvester]]></dc:creator><pubDate>Thu, 26 Apr 2018 14:13:39 GMT</pubDate><enclosure url="https://i.ecency.com/p/HNWT6DgoBc18GVREvvsnAjfLwLF5qHHFduNHKinqDjS4W1tKhdDzrjiSLfPAxpchABHizuBfKcZKoMz2meBWaK5US285zwDvpxRQEfNi8d2kk63v5ARKYDtqQAr?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>