Category Cybersecurity

IPv4

This post explains briefly the network protocol IPv4 and summarizes the main aspects of it. IPv4 Address An IPv4 address represents a single device on an IP network. An IPv4 address consist of 32 bits. Example: 11000110001100110110010000000000 These 32 bits…

sqlmap

sqlmap is a command line tool to automatize SQL injections. Examples Retrieve tables on DB (–tables;)] specify database with -D: sqlmap -u “” –cookie=<“cookie value which you have copied in step #5”> -D moviescope –tables Retrieve columns from a table…

Wireshark

      Filters TCP Ports tcp.port Filters the tcp port/s of packets displayed. Example: tcp.port == “21”   HTTP Request Methods http.request.method Possible values: get post Example: http.request.method == “POST”   Contains cookies http.cookie Example: http.cookie   External references…

Windows ping syntax

Parameters -f switch sets the Do Not Fragment bit on the ping packet. By default, the ping packet allows fragmentation. In the ping command, the –l option means to send the buffer size in bytes. It is followed by the…