IPv4
This post explains briefly the network protocol IPv4 and summarizes the main aspects of it. IPv4 Characteristics IPv4 is based on best effort. It does not guarantee delivery. The datagrams are not delivered in order. It is resilient, and uses…
This post explains briefly the network protocol IPv4 and summarizes the main aspects of it. IPv4 Characteristics IPv4 is based on best effort. It does not guarantee delivery. The datagrams are not delivered in order. It is resilient, and uses…
sqlmap is a command line tool to automatize SQL injections. Examples Retrieve tables on DB (–tables;)] specify database with -D: sqlmap -u “” –cookie=<“cookie value which you have copied in step #5”> -D moviescope –tables Retrieve columns from a table…
Testing for SQL Injection ||6 ‘||6’ (||6) ‘ OR 1=1– OR 1=1 ‘ OR ‘1’=’1 ; OR ‘1’=’1′ %27+–+ “or 1=1– ‘ or 1=1 /* or 1=1– ” or “a”=”a Admin’ OR ‘ ‘ having 1=1– ‘ OR ‘text’= N’text’…
This post explain what is Metasploit Framework and its uses regarding Certificated Ethical Hacker (CEH) Exam. It is not intented to be an overall review of the tool. It is focused on CEH v10. What is Metasploit Framework? Metasploit Framework…
According to some people that have performed Certified Ethical Hacker (CEH) Practical exam, they say that most of the scenarios are based on exercises presented on CEH iLabs, that are included in the official CEH iLearn Course. So for CEH…
There are some situtations in which you need to modify Windows firewall configuration and you have only command-line access. In these cases, you can make use of the command netsh Command Prompt. netsh is available from Windows 2000 and above.…
Theef is a backdoor Trojan. External references
Filters TCP Ports tcp.port Filters the tcp port/s of packets displayed. Example: tcp.port == “21” HTTP Request Methods http.request.method Possible values: get post Example: http.request.method == “POST” Contains cookies http.cookie Example: http.cookie External references…
Some laptop users prefer to use US international keyboards on their computer, despite their first language is not American English or they do not live in the USA. The reasons may vary: some are developers that find that characters frequently…
Parameters -f switch sets the Do Not Fragment bit on the ping packet. By default, the ping packet allows fragmentation. In the ping command, the –l option means to send the buffer size in bytes. It is followed by the…