Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
_site/
.sass-cache/
.jekyll-cache/
.jekyll-metadata
vendor/
.bundle/
Gemfile.lock
node_modules/
*.gem
.DS_Store
4 changes: 4 additions & 0 deletions Gemfile
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
source "https://rubygems.org"

gem "github-pages", group: :jekyll_plugins
gem "webrick", "~> 1.8"
26 changes: 25 additions & 1 deletion _config.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,28 @@
title: Tech with Orgito
description: Cybersecurity, software engineering & CTF writeups
theme: minima
url: "https://techwithorgito.github.io"
baseurl: ""

# Build settings
markdown: kramdown
highlighter: rouge
permalink: /:year/:month/:day/:title/

# Kramdown settings for better code blocks
kramdown:
input: GFM
syntax_highlighter: rouge
syntax_highlighter_opts:
block:
line_numbers: false

# Exclude from processing
exclude:
- Gemfile
- Gemfile.lock
- node_modules
- vendor

# Pagination
paginate: 10
paginate_path: "/page:num/"
32 changes: 32 additions & 0 deletions _layouts/default.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>{% if page.title %}{{ page.title }} | {% endif %}{{ site.title }}</title>
<meta name="description" content="{% if page.excerpt %}{{ page.excerpt | strip_html | strip_newlines | truncate: 160 }}{% else %}{{ site.description }}{% endif %}">
<link rel="stylesheet" href="{{ '/assets/css/style.css' | relative_url }}">
</head>
<body>
<header>
<div class="container">
<h1 class="site-title"><a href="{{ '/' | relative_url }}">{{ site.title }}</a></h1>
<p class="site-description">{{ site.description }}</p>
<nav>
<a href="{{ '/' | relative_url }}">Home</a>
<a href="{{ '/about' | relative_url }}">About</a>
</nav>
</div>
</header>

<main class="container">
{{ content }}
</main>

<footer>
<div class="container">
<p>&copy; {{ site.time | date: '%Y' }} {{ site.title }}. Technical blog powered by Jekyll.</p>
</div>
</footer>
</body>
</html>
27 changes: 27 additions & 0 deletions _layouts/home.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
layout: default
---

<div class="home">
{{ content }}

<h2>Recent Posts</h2>

{% if site.posts.size > 0 %}
<ul class="post-list">
{% for post in site.posts %}
<li>
<span class="post-meta">{{ post.date | date: "%b %d, %Y" }}</span>
<h3>
<a href="{{ post.url | relative_url }}">{{ post.title | escape }}</a>
</h3>
{% if post.excerpt %}
<p class="post-excerpt">{{ post.excerpt | strip_html | truncatewords: 50 }}</p>
{% endif %}
</li>
{% endfor %}
</ul>
{% else %}
<p>No posts yet.</p>
{% endif %}
</div>
13 changes: 13 additions & 0 deletions _layouts/page.html
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
---
layout: default
---

<article class="page">
<header class="page-header">
<h1 class="page-title">{{ page.title }}</h1>
</header>

<div class="page-content">
{{ content }}
</div>
</article>
32 changes: 19 additions & 13 deletions _layouts/post.html
Original file line number Diff line number Diff line change
@@ -1,14 +1,20 @@
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<title>{{ page.title }}</title>
</head>
<body>
<article>
<h1>{{ page.title }}</h1>
<p><em>{{ page.date | date: "%B %d, %Y" }}</em></p>
---
layout: default
---

<article class="post">
<header class="post-header">
<h1 class="post-title">{{ page.title }}</h1>
<p class="post-meta">
<time datetime="{{ page.date | date_to_xmlschema }}">{{ page.date | date: "%B %d, %Y" }}</time>
</p>
</header>

<div class="post-content">
{{ content }}
</article>
</body>
</html>
</div>

<footer class="post-footer">
<a href="{{ '/' | relative_url }}">&larr; Back to all posts</a>
</footer>
</article>
79 changes: 79 additions & 0 deletions _posts/2026-01-15-sql-injection-fundamentals.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,79 @@
---
layout: post
title: "Understanding SQL Injection Attacks"
date: 2026-01-15
---

SQL injection remains one of the most common and dangerous web application vulnerabilities. This post explains the fundamentals.

## The Vulnerability

SQL injection occurs when user input is directly concatenated into SQL queries without proper sanitization:

```python
# Vulnerable code
username = request.GET['username']
query = f"SELECT * FROM users WHERE username = '{username}'"
cursor.execute(query)
```

An attacker can input `admin' OR '1'='1` to bypass authentication.

## Exploitation Technique

Basic SQL injection follows this pattern:

```sql
-- Original query
SELECT * FROM users WHERE username = 'admin' AND password = 'pass123'

-- Injected payload
username: admin' OR '1'='1' --
password: anything

-- Resulting query
SELECT * FROM users WHERE username = 'admin' OR '1'='1' --' AND password = 'anything'
```

The `--` comment operator causes everything after it to be ignored.

## Prevention

Use parameterized queries:

```python
# Secure code
username = request.GET['username']
query = "SELECT * FROM users WHERE username = ?"
cursor.execute(query, (username,))
```

Additional defenses:

- Input validation and sanitization
- Least privilege database accounts
- Web application firewalls
- Regular security audits

## Detection

Look for these indicators in logs:

```text
username=admin' OR '1'='1
id=1 UNION SELECT null,null,null--
search=' AND 1=CONVERT(int, (SELECT @@version))--
```

Tools like SQLMap automate detection and exploitation during security assessments.

## Real-World Impact

SQL injection can lead to:

- Authentication bypass
- Data exfiltration
- Database modification or deletion
- Remote code execution (in some configurations)

Always validate input and use parameterized queries.
42 changes: 36 additions & 6 deletions _posts/2026-02-01-welcome-to-tech-with-orgito.md
Original file line number Diff line number Diff line change
@@ -1,12 +1,42 @@
---
layout: post
title: "Welcome to Tech with Orgito"
date: 2026-01-30
---

This blog is about:
- Cybersecurity
- Software engineering
- CTF writeups
- Technical research
This blog covers cybersecurity, software engineering, CTF writeups, and technical research.

No fluff. Just tech.
## What to Expect

Technical content focused on:

- Security vulnerabilities and exploit development
- Software architecture and design patterns
- CTF challenges and writeups
- Code analysis and reverse engineering
- Cloud security and infrastructure

## Code Examples

All posts include properly formatted code with syntax highlighting:

```python
def exploit_buffer_overflow(target, payload):
"""
Example: Buffer overflow exploitation
"""
offset = 268
return_address = b"\xef\xbe\xad\xde"

exploit = b"A" * offset
exploit += return_address
exploit += payload

return exploit
```

## Technical Writing Style

Posts are concise and technical. No marketing language, no emojis, just clear explanations of complex topics.

Stay tuned for deep dives into security research, software engineering best practices, and CTF solutions.
11 changes: 10 additions & 1 deletion about.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,13 @@ layout: page
title: About
---

Tech with Orgito is a technical blog focused on cybersecurity, CTFs, and software engineering.
Tech with Orgito is a technical blog focused on:

- Cybersecurity research and practical security
- Software engineering and system design
- CTF writeups and challenges
- Technical experiments and deep dives

This blog aims to provide clear, technical content without fluff. All posts are written in Markdown and focus on practical knowledge and real-world applications.

Topics include exploit development, secure coding practices, reverse engineering, network security, cloud architecture, and various programming languages and frameworks.
Loading