-
DC-9 Vulnhub Walkthrough – OSCP way
Recently, My focus turned more towards OSCP and I am thinking of taking the exam. After reading tons of people’s experience over Reddit, I took some notes on what would be my way of studying for this. It isn’t easy from the looks of it and to win with time, I need a lot of…
-
SQL Injection on Base64 Encoded String Parameters
This article is a guide to perform SQL Injection on the Base64 encoded Url parameters. These parameters are encoded so as to make the site injection proof but that is a big myth. Recently I came across “www.somesite.com/index.php?pid=VkRGRk9WQlJQVDA9″ this kind of URLs. The pid here, “VkRGRk9WQlJQVDA9“. It is nothing but 4 times encoded base64 string,…
-
Time based Blind SQL Injection on MySQL: How to do manually
This article will guide you on how to perform time based SQL Injection on MySQL database. The last article was about Boolean based Blind SQL inection. Application that has been used here for performing attack is Bwapp vulnerable web application. How to know when you need to test for Time based Blind SQL Injection? While…
-
Boolean Based Blind SQL Injection on MySQL: How to do manually
This article will guide you on how to do Blind Boolean SQL Injection. As I have already told you in the last article that Blind SQL Injection is more like a guessing game and it is time consuming. An automated way is going to save your time but that way you won’t be able to…
-
What to do after SQL injection: Finding Admin Panel
We have already talked about Error Based SQL Injection. If you missed my article on that here is the link: http://www.anonhack.in/2018/04/sql-injection-part-4getting-admin-password/ The question that arises after getting the username and MD5 hash as password is “where do you use those credentials?” The answer to this is simple if there is a user table with password, there…
-
SQL INJECTION PART 4:Getting admin password
SQL injection is one of the most dangerous attack on websites. Many manually created dynamic website do not have input filtration and thus leveraging themselves to this attack. This article will guide you on how to perform SQL Injection to get the admin password in a modsecurity environment in which the union and select command…
-
How to become a Hacker?
Hacker is a person who can gain unauthorized access to a device. Many people have this question in their mind, “How to become one?”. Before I give answer to this question, I would like to explain the concept of everything related to hacking. Hacking is a vast field, it consist of topics not just limited…
-
SQL Injection part 3: Identifying String Data or Numeric Data
This is my third post on SQL Injection, The first post SQL Injection part 1 was just a basic one to check if the SQL vulnerability exist on a certain website and SQL Injection part 2 shows how to exploit the SQL vulnerability. We inject SQL in three parameters, namely: String Data Numeric Data Query structure In…
-
Kioptrix Level 2 Challenge Solution
Kioptrix Level 2 challenge was quite hard compared to the Kioptrix Level 1. we have to have the understanding the web application and should try different ways to finding vulnerability. Requirements: Vmware Kioptrix level 2 challenge Kali [strictly depends on your choice] So lets dive in: -> Nmap 192.168.0.1/24 So my Kioptrix machine has the…
-
SQL Injection Part 2
In this article we will be looking at SQL Injection and how we can exploit different types of SQL vulnerabilities present on a website.SQL Injection is one most dangerous ways to get into some site and ruin it totally! Database contains every precious information. It consist of records of credit cards, names with address or…
-
SQL Injection Part 1
SQL Injection is the most devastating vulnerability on web platform.In this article, I will be telling how costly and severe this vulnerability is, if exploited. SQL is a database language. Everything related to person’s identification is stored in the database, such as Emails,Usernames,Passwords, and credit card numbers!In SQL injection part 1, we will be talking…