skip to main
|
skip to sidebar
Home
About Me
Home
Manual Testing
Authentication Bypass
Sql injection
Sql injection Bypassing WAF
RFI
LFI
Cookie stealing using XSS
Testing Tools
Scanning
Nessus
Metasploit
Arachni Web scanner
Acunetix
IBM AppScan
Malware
Info Gathering of Basic Analysis
Tips/Tricks
Site Contents
Menu
Home
HTML Drop Down
DHTML Menu
JavaScript DropDown
Cascading Menu
CSS Horizontal Menu
Download
ASP Dropdown
Pulldown menu
AJAX Drop Submenu
DIV Cascading Menu
Order
Help
Contact
Note: Replace # by the link of the item and if you want to add the menu, say the third element. Replace
Order
by the following code:
Home
HTML Drop Down
DHTML Menu
JavaScript DropDown
Cascading Menu
CSS Horizontal Menu
Site Contents
Authentication Bypass
SQL Injesction
MSSQL Injection
MySQL Injection
MySQL Injection Bypassing WAF
LFI
RFI
Cookie Stealing Using XSS
Use of Acunetix
Use of IBM AppScan
Metasploit
Basic Metasploiting
Windows lnk Exploiting
working with Nessus
Basic working with Nessus
How To Shutdown A Computer With A Cell Phone
Arachni Web scanner (CLI & WEB GUI)
Tips & Tricks
0 comments:
Post a Comment
Subscribe to our RSS Feed
Follow Us on Twitter
Be Our Fan on Facebook
Popular
Tags
Blog Archives
Popular Posts
(no title)
MySQL injection with Bypassing WAF: Comments: SQL comments are a blessing to us SQL injectors. They allow us to bypass a lot of the ...
LFI (Local File Inclusion)
LFI bounce using chunked transfer encoding Local File Inclusion ( also known as LFI ) is the process of including files on a ser...
Cookie Grabbing using XSS
XSS means Cross-site Scripting is a type of computer security vulnerability typically found in Web applications that enables at...
RFI (Remote File Inclusion)
Remote File Inclusion (RFI) is a type of vulnerability some websites. It allows an attacker to include a remote file, usually throu...
Preventing XSS (PHP)
Lets take an example : <html> <body> <form action="xss.php" method="POST"> Val: <input ty...
SCANNING
A vulnerability scanner is a computer program designed to assess computers, computer systems, networks or applications for weaknesses. Ther...
MSSQL Injection
MSSQL Injection Ex: google dork inurl:.asp?id= find a result like : http://www.somesite.com/some.asp?ID=12 Now to check if it...
Disable Directory Listing
Mostly you observe this directory listing in many websites : Ex: www.demo.com/ like traversing direcotries trying www.demo.com/images/...
Windows lnk Exploit
Hack the system using the windows lnk exploit: Update metasploit. Goto the prompt and goto framework Then type: #./msfconso...
How To Shutdown A Computer With A Cell Phone
First you need to create a batch file to perform shutdown etc .you can write them down yourself. * Open your notepad and type the followi...
Labels
Sql Injection Bypassing WAF
(1)
Archive
▼
2012
(5)
▼
May
(2)
Basic Information Gathering of Analysis on Malware...
Disable Directory Listing
►
April
(1)
►
January
(2)
►
2011
(11)
►
November
(1)
►
October
(7)
►
September
(3)
OTHER PENTEST BLOGS
Pentest Lab
Recent Posts
0 comments:
Post a Comment