Quantcast
Browsing all 1812 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Wordpress Penetration Testing using Symposium Plugin SQL Injection

WP Symposium turns a WordPress website into a Social Network! It is a WordPress plugin that provides a forum, activity (similar to Facebook wall), member directory, private mail, notification panel,...

View Article


Image may be NSFW.
Clik here to view.

Hack Remote PC using PSEXEC Injection in SET Toolkit

Target: Window ServerAttacker machine: kali LinuxIn this article I am going to make powershell injection attack though SEToolkit; for this attack it is necessary that SMB service must be running and...

View Article


Image may be NSFW.
Clik here to view.

Hack the Fortress VM (CTF Challenge)

Previously you have breach many vulnhub CTF, today we will try to breach FORTRESS VULNHUB CTF. Download it fromhere. Start Kali Linux and follow  these steps.Open terminal in Kali Linux and run this...

View Article

Image may be NSFW.
Clik here to view.

Penetration Testing of HTTP Protocol (Verb Tempering)

You all are very much aware of HTTP protocol and its services. HTTP is considered to authorize intermediate network elements to develop communications between clients and servers. HTTP is an...

View Article

Image may be NSFW.
Clik here to view.

5 ways to Exploiting PUT Vulnerability in Webserver

Today’s article is related to bypass PUT method vulnerability through various techniques. From previous article we came across to the different action perform by HTTP methods where I have describe the...

View Article


Image may be NSFW.
Clik here to view.

Hack Padding Oracle Lab (CTF Challenge)

The main purpose to solve this lab was to share the padding oracle attack technique with our visitorsThe padding oracle attack enables an attacker to decrypt encrypted data without knowledge of the...

View Article

Image may be NSFW.
Clik here to view.

Shell uploading through sql Injection using Sqmap in bWAPP

Multiple times you people have used sqlmap for sql injection to get database of web server. Here in this tutorial I will show you how to upload any backdoor if the website is suffering from sql...

View Article

Image may be NSFW.
Clik here to view.

Meterpreter Shell uploading in DVWA with SQl Injection

This article is exactly same as previous article; today I will make use of sqlmap to upload backdoor filein DVWA suffering from sql injection vulnerbility. Requirement:Xampp/Wamp ServerDVWA LabKali...

View Article


Image may be NSFW.
Clik here to view.

Command Injection Exploitation through SQL Injection using Sqlmap in DVWA

In this article we will see how to perform command injection using sqlmap and try to execute any cmd command through sqlmap if web server is having sql vulnerability.Requirement:Xampp/Wamp Server...

View Article


Image may be NSFW.
Clik here to view.

Web Penetration Testing Lab setup using XVWA

XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. It’s not advisable to host this application online as it is designed to be...

View Article

Image may be NSFW.
Clik here to view.

Exploiting the Webserver using Sqlmap and Metasploit (OS-Pwn)

This artilce is about how to use sqlmap for sql injection to hack victim pc and gain shell access. Here I had perform sql attack to gain three different type of  shell (meterpreter; command shell; VNC...

View Article

Image may be NSFW.
Clik here to view.

Hack the Pentester Lab: from SQL injection to Shell VM

Today we are going to perform penetration testing in another lab, download it from here. Now install the iso image in VM ware and start it. The task given in this lab is to gain access of...

View Article

Image may be NSFW.
Clik here to view.

Brute Forcing Multiple Databases using HexorBase

HexorBase is a database application designed for administering and auditing multiple database servers simultaneously from a centralized location, it is capable of performing SQL queries and bruteforce...

View Article


Image may be NSFW.
Clik here to view.

Sql Injection Exploitation with Sqlmap and Burp Suite (Burp CO2 Plugin)

Burp CO2 is an extension for the popular web proxy / web application testing tool called Burp Suite, available at Portswigger. You must install Burp Suite before installing the Burp CO2 extension. The...

View Article

Image may be NSFW.
Clik here to view.

SQL Injection Exploitation in Multiple Targets using Sqlmap

In this article we are going to perform sql injection attack on multiple target through sqlmapIn the tutorial I had used two buggy web dvwa and Acurat (vulweb.com).  Start dvwa  and select sql...

View Article


Image may be NSFW.
Clik here to view.

Hack the Pentester Lab: from SQL injection to Shell II (Blind SQL Injection)

Today we are going to perform penetration testing with part II of previous lab, download it from here. Now install the iso image in VM ware and start it. In this lab task level is intermediate and...

View Article

Image may be NSFW.
Clik here to view.

Easy way to Hack Database using Wizard switch in Sqlmap

Sqlmap provides wizard options for beiggner  and save your much time. So start your kali Linux and open the terminal and now the following command to use wizard interface of sqlmap.sqlmap -u...

View Article


Image may be NSFW.
Clik here to view.

Exploiting Sql Injection with Nmap and Sqlmap

This article is about how to scan any target for sql injection using NMAP and then exploit the target with sqlmap if NMAP finds the target is vulnerable to sql injection. Now go with this tutorial for...

View Article

Image may be NSFW.
Clik here to view.

Hack the Basic HTTP Authentication using Burpsuite

In the context of a HTTP transaction, basic access authentication is a method for a HTTP user agent to provide a user name and password when making a request.HTTP Basic authentication (BA)...

View Article

Image may be NSFW.
Clik here to view.

Beginner Guide of mysql Penetration Testing

In this article we are going to perform penetration testing on mysql server, here we will perform attack through metasploit framework.Attacker: kali LinuxTarget: metasploitable IILets...

View Article
Browsing all 1812 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>