Category: Web Exploitation
What is the “order by” injection? Contents discussed herein refer to the position of the controllable order by clause, the order parameter controllable as: Analyzing simple injection In the early...
WATABO is a security tool for testing web applications. It is intended to enable security professionals to perform efficient (semi-automated) web application security audits. Most important features: WATOBO has Session...
Now, many website administrators use to add the target = “_ blank” attribute to the link address of the page, which is definitely a very insecure behavior. Not only that,...
Browsers now allow developers to automatically add content to a user’s clipboard, following certain conditions. Namely, this can only be triggered by browser events. This post details how you can...
In the XSS world, there are many tags, events, attributes can be used to execute js. Tag can execute js <script> <a> <p> <img> <body> <button> <var> <div> <iframe> <object>...
What is a local file inclusion (LFI) vulnerability? LFI allows an attacker to include a file on a server through a browser. When a Web application does not properly filter...
We have filled the world of hackers with infinite fantasy and fear, but with the rise of technology and security in the field of progress, hacking technology has become increasingly...
Find SQL injections This python script is developed to show, how many vulnerable websites, which are laying around on the web. The main focus of the script is to generate...
Cross-site scripting (XSS) is a common vulnerability in Web vulnerability analysis. In many cases, it was easy to enter without filtering easily, but most of the services analyzed had strong...
To interesting resources was presented sqlmap-the Web-the GUI . This is a GUI for the program sqlmap (designed to analyze web applications on the SQL-inject). Installing SQLMAP-Web-GUI on Kali Linux...
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful...
Cross Site Scripting (Cross Site Scripting, XSS) is a Web application attack in the data output to the page when there is a problem, leading to an attacker can be...
Collected some of the more useful XSS payload, used to bypass the waf and some applications: <sCrIpt>alert(1)</ScRipt> \<iMg srC=1 lAnGuAGE=VbS oNeRroR=mSgbOx(1)> <img src=’1′ onerror\x00=alert(0) /> <img src=’1′ onerror/=alert(0) /> <img...
Get basic information Judgment branch does not support stack query: ;declare @d int– ;select count(*) from sysobjects–To determine whether the station library separation: and 1=(@@servername%2b’|’%2bhost_name())–Determine if XP_CMDSHELL exists: and 1=(Select...
Apache Struts is an open source project maintained by the Apache Software Foundation, an open source MVC framework for creating enterprise Java Web applications, offering two versions of the framework...