Ethical hacking and penetration testing

InfoSec, IT, Kali Linux, BlackArch

Main Menu
  • Home
  • LocalBitcoins
  • Kali Wi-Fi
  • Site Tree
  • Kali Tools
  • Online tools
  • Donate
  • VDS

Tag: SQL injection

 

How to use User Agent to attack websites

Alex October 30, 2020 Burp Suite, cURL, hacking, HTML, HTTP, HTTP headers, JavaScript, PHP, SQL injection, sqlmap, User Agent, vulnerabilities, web-sites, webapps, XSS Web Applications No Comments »

Best Kali Linux tools in WSL (Windows Subsystem for Linux) (Part 1)

Alex September 21, 2020 Kali Linux, network scanning, Nikto, ping, SQL injection, sqlmap, testssl.sh, traceroute, tracerouting, webapps, WhatWeb, whois, Wig, Win-Kex, Windows, Windows Subsystem for Linux (WSL), WordPress, WPScan Exploitation, Information Gathering, Web Applications, Work Environment No Comments »

jSQL Injection usage guide: a multifunctional tool for scanning and exploiting SQL injection in Kali Linux

Alex July 7, 2018 GUI, hacking, jSQL Injection, Kali Linux, SQL injection, webapps Web Applications No Comments »

How to use sqlmap for injection in address of a web site page (URI). Arbitrary injection points

Alex February 5, 2018 exploitation, hacking, SQL injection, sqlmap, webapps Exploitation, Web Applications No Comments »

Subscribe to new articles

Loading

Join us in telegram

Telegram notifications about new articles on Miloserdov.org: t.me/miloserdov_org

Also recommended



Search

Categories

  • Anonymity, data encryption and anti-forensics
  • Exploitation
  • Hardware
  • Improving security
  • Information Gathering
  • IT Forensics
  • Kali Linux
  • Maintaining Access
  • Password Attacks
  • Reverse Engineering
  • Sniffing & Spoofing
  • Web Applications
  • Website news
  • Wireless Attacks
  • Work Environment

Recent Posts

  • Guide to GPS Metadata in Photos (Part 3): How to spoof GPS and other metadata in photos
  • Guide to GPS Metadata in Photos (Part 2): How to understand, extract and convert geographic coordinates
  • Guide to GPS Metadata in Photos (Part 1): Programs for manipulating metainformation in images
  • IP camera security audit
  • Wi-Fi adapter Qualcomm Atheros QCA9377 does not capture data packets in monitor mode (SOLVED)

Recent Comments

  • leletheripper on How to hack a Windows password
  • Anonymous on How to boot without a graphical interface in Kali Linux
  • Alex on How to increase TX-Power of Wi-Fi adapters in Kali Linux in 2020
  • Name on How to increase TX-Power of Wi-Fi adapters in Kali Linux in 2020
  • Name on How to increase TX-Power of Wi-Fi adapters in Kali Linux in 2020

New Penetration Testing Tools

  • DNSRecon
    Source: New Penetration Testing Tools Published on 2020-07-08
  • dnsenum
    Source: New Penetration Testing Tools Published on 2020-07-08
  • ngrok
    Source: New Penetration Testing Tools Published on 2020-03-31
  • trackerjacker
    Source: New Penetration Testing Tools Published on 2019-09-26
  • OneShot
    Source: New Penetration Testing Tools Published on 2019-08-29
  • usbrip
    Source: New Penetration Testing Tools Published on 2019-08-27
© 2021: Ethical hacking and penetration testing | SnowFall Theme by: D5 Creation | Powered by: WordPress