SQL Injection Queries Examples
Testing for SQL Injection ||6 ‘||6’ (||6) ‘ OR 1=1– OR 1=1 ‘ OR ‘1’=’1 ; OR ‘1’=’1′ %27+–+ “or 1=1– ‘ or 1=1 /* or 1=1– ” or “a”=”a Admin’ OR ‘ ‘ having 1=1– ‘ OR ‘text’= N’text’…
Testing for SQL Injection ||6 ‘||6’ (||6) ‘ OR 1=1– OR 1=1 ‘ OR ‘1’=’1 ; OR ‘1’=’1′ %27+–+ “or 1=1– ‘ or 1=1 /* or 1=1– ” or “a”=”a Admin’ OR ‘ ‘ having 1=1– ‘ OR ‘text’= N’text’…
This post explain what is Metasploit Framework and its uses regarding Certificated Ethical Hacker (CEH) Exam. It is not intented to be an overall review of the tool. It is focused on CEH v10. What is Metasploit Framework? Metasploit Framework…
According to some people that have performed Certified Ethical Hacker (CEH) Practical exam, they say that most of the scenarios are based on exercises presented on CEH iLabs, that are included in the official CEH iLearn Course. So for CEH…
There are some situtations in which you need to modify Windows firewall configuration and you have only command-line access. In these cases, you can make use of the command netsh Command Prompt. netsh is available from Windows 2000 and above.…
Theef is a backdoor Trojan. External references
Filters TCP Ports tcp.port Filters the tcp port/s of packets displayed. Example: tcp.port == “21” HTTP Request Methods http.request.method Possible values: get post Example: http.request.method == “POST” Contains cookies http.cookie Example: http.cookie External references…
Some laptop users prefer to use US international keyboards on their computer, despite their first language is not American English or they do not live in the USA. The reasons may vary: some are developers that find that characters frequently…
Parameters -f switch sets the Do Not Fragment bit on the ping packet. By default, the ping packet allows fragmentation. In the ping command, the –l option means to send the buffer size in bytes. It is followed by the…
Examples nc -l -p 2222 | nc 10.1.0.43 1234 Netcat will listen on port 2222 and output anything received to a remote connection on 10.1.0.43 port 1234
This post sums up the scattered information I have found regarding Certified Ethical Hacker (CEH) Practical Exam and my conclusions about how to prepare it. My intention is not to include real questions from the exam, but give advice to…