XVWA :Web Application Hacking Lab in kali linux
XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. It’s not advisable to host this application online as it is designed...
Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published April 17, 2017 · Last modified November 4, 2024
XVWA is a badly coded web application written in PHP/MySQL that helps security enthusiasts to learn application security. It’s not advisable to host this application online as it is designed...
SQLmap POST request injection Sometimes SQL injection attacks are only successful with HTTP post methods. In this post, I am going to demonstrate the easiest way is to deploy a...
Web Exploitation / Web Maintaining Access / WebApp PenTest
by do son · Published April 11, 2017 · Last modified September 12, 2017
From SQL injection to RCE Once a MySQL database server has been compromised at the root level, it’s often possible to escalate this access to full system level access. In...
Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published April 10, 2017 · Last modified November 4, 2024
What is XPath? XPath Injection Similar to SQL injection, XPath injection occurs when the site uses the information entered by the user to construct the request for XML data. An...
Web Exploitation / WebApp PenTest
by do son · Published April 10, 2017 · Last modified July 29, 2017
WAF (web application firewall) has become one of the standard security solutions. It is because of it, many companies do not care even have a web application vulnerabilities. Unfortunately, not...
Web Exploitation / WebApp PenTest
by do son · Published April 9, 2017 · Last modified November 4, 2024
Some usefull sqlmap command for testing SQL injection vulnerability. 1.Analyzing the current user is dba python sqlmap.py -u “url” –is-dba -v 1 2) — users: user list database management system...
Undoubtedly one of the most famous and important in the world of Hacking and PenTest attacks are SQL injections , this is because the vast majority of systems use managers...
Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published April 7, 2017 · Last modified November 4, 2024
XSS Jacking is a new XSS attack by Dylan Ayrey that can steal sensitive information from the victim. XSS Jacking requires three paired with other technologies, are clicking hijacking, hijacking...
Web Exploitation / WebApp PenTest
by do son · Published March 14, 2017 · Last modified November 4, 2024
HTTP is a stateless protocol, in order to maintain and track the user’s state, the introduction of the Cookie and Session. Cookie First introduced with Netscape 0.9 on October 13,...
Web Exploitation / WebApp PenTest
by do son · Published March 10, 2017 · Last modified November 4, 2024
Recently, WordPress team is published WordPress version 4.7.3. This version fixed some errors that existed in previous WordPress versions. On this post, I am going to analysis WordPress 4.7.2 Cross-Site...
Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published February 13, 2017 · Last modified July 28, 2017
XPath Injection Similar to SQL injection, XPath injection occurs when the site uses the information entered by the user to construct the request for XML data. An attacker sends specially...
Web Exploitation / WebApp PenTest
by do son · Published February 11, 2017 · Last modified November 4, 2024
What is Memcached? Free & open source, high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load....
Web Exploitation / WebApp PenTest
by do son · Published January 23, 2017 · Last modified November 4, 2024
On the previous post, I introduced to you the concept of buffer overflow. On this post, I am going to guide you how to find and exploit buffer overflow vulnerability....
Web Exploitation / Web Maintaining Access / WebApp PenTest
by do son · Published December 27, 2016 · Last modified September 1, 2017
File upload vulnerability is when the user uploads an executable script file, and through the script file to obtain the ability to execute server-side commands. This attack is the most...
Web Exploitation / WebApp PenTest
by do son · Published December 25, 2016 · Last modified November 4, 2024
Introduce The PUT method requests that the enclosed entity be stored under the supplied Request-URI. If the Request-URI refers to an already existing resource, the enclosed entity SHOULD be considered...