What is Cross-Site Scripting (XSS)?
1. What is Cross Site Scripting? Cross Site Scripting (Cross Site Scripting, XSS) is a Web application attack in the data output to the page when there is a problem,...
Web Vulnerability Analysis / WebApp PenTest
by do son · Published April 10, 2017 · Last modified July 26, 2017
1. What is Cross Site Scripting? Cross Site Scripting (Cross Site Scripting, XSS) is a Web application attack in the data output to the page when there is a problem,...
Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published April 7, 2017 · Last modified November 4, 2024
XSS Jacking is a new XSS attack by Dylan Ayrey that can steal sensitive information from the victim. XSS Jacking requires three paired with other technologies, are clicking hijacking, hijacking...
Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published February 13, 2017 · Last modified July 28, 2017
XPath Injection Similar to SQL injection, XPath injection occurs when the site uses the information entered by the user to construct the request for XML data. An attacker sends specially...
Technique / Web Vulnerability Analysis / WebApp PenTest
by do son · Published January 9, 2017 · Last modified July 27, 2017
CSP (Content Security Policy) is mainly used to define which resources page (JS / CSS / FONT / IFRAME / XHR / …) can be loaded, can effectively play the...
Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest
by do son · Published January 3, 2017 · Last modified November 4, 2024
PenQ is an open source, Linux-based penetration testing browser bundle we built over Mozilla Firefox. It comes pre-configured with security tools for spidering, advanced web searching, fingerprinting, anonymous browsing, web...
Web Vulnerability Analysis / WebApp PenTest
by do son · Published January 2, 2017 · Last modified November 4, 2024
The web application uses templates to make the web pages look more dynamic. Server Side Template Injection occurs when user input is embedded in a template in an unsafe manner....
Metasploit / Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest
by do son · Published January 2, 2017 · Last modified November 4, 2024
Introduce The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open...
What is NoSQL? NoSQL often translated as Not only SQL, is a type of database that does not use the traditional SQL interface and usually does not store its...
Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published December 24, 2016 · Last modified November 4, 2024
Burp Suite is an integrated platform for attacking web applications. It contains a number of tools, and for these tools to design a number of interfaces to accelerate the process...
Web Exploitation / Web Vulnerability Analysis / WebApp PenTest
by do son · Published December 22, 2016 · Last modified November 4, 2024
Introduce Cross-site request forgery [CSRF], also known as a one-click attack or session riding or Sea-Surf and abbreviated as CSRF or XSRF, is a type of malicious attack exploit of...
Web Vulnerability Analysis / WebApp PenTest
by do son · Published December 21, 2016 · Last modified November 4, 2024
Both in the traditional PC Web platform or mobile terminal platform, client-side or server-side, the JavaScript fairly good performance and reflect the rich framework to support, so it as a...
Exploitation / Information Gathering / Maintaining Access / Network PenTest / Post Exploitation / Vulnerability Analysis / Web Exploitation / Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest
by do son · Published December 21, 2016 · Last modified August 1, 2017
A penetration test (pentest for short) is a method of attacking a computer’s systems in the hope of finding weaknesses in its security. If the pentest successfully gains access, it...
Exploitation / Information Gathering / Maintaining Access / Metasploit / Network PenTest / Post Exploitation / Vulnerability Analysis / Web Exploitation / Web Information Gathering / Web Maintaining Access / Web Vulnerability Analysis / WebApp PenTest
by ddos-admin · Published December 15, 2016 · Last modified November 4, 2024
Penetration Testing Toolkit A web interface to automate Scanning, Generating metasploit payload, Network Testing,Exploring CMS,Information Gathering,DNS Queries,IP Tools,Domain tools and much more. Features Includes web interface for different tools for...
Network PenTest / Vulnerability Analysis / Web Vulnerability Analysis / WebApp PenTest
by do son · Published December 12, 2016 · Last modified November 4, 2024
Introduction nmap (“Network Mapper”) is an open source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine to scan single...
Web Vulnerability Analysis / WebApp PenTest
by do son · Published December 12, 2016 · Last modified November 4, 2024
Vane is a vulnerability scanner that scans WordPress for all webmasters to scan for WordPress vulnerabilities and find and fix problems before they go live. It is a great WordPress...