SQL Injection Queries Examples
Testing for SQL Injection ||6 ‘||6’ (||6) ‘ OR 1=1– OR 1=1 ‘ OR ‘1’=’1 ; OR ‘1’=’1′ %27+–+ “or 1=1– ‘ or 1=1 /* or 1=1– ” or “a”=”a Admin’ OR ‘ ‘ having 1=1– ‘ OR ‘text’= N’text’…
Testing for SQL Injection ||6 ‘||6’ (||6) ‘ OR 1=1– OR 1=1 ‘ OR ‘1’=’1 ; OR ‘1’=’1′ %27+–+ “or 1=1– ‘ or 1=1 /* or 1=1– ” or “a”=”a Admin’ OR ‘ ‘ having 1=1– ‘ OR ‘text’= N’text’…
This post explain what is Metasploit Framework and its uses regarding Certificated Ethical Hacker (CEH) Exam. It is not intented to be an overall review of the tool. It is focused on CEH v10. What is Metasploit Framework? Metasploit Framework…
According to some people that have performed Certified Ethical Hacker (CEH) Practical exam, they say that most of the scenarios are based on exercises presented on CEH iLabs, that are included in the official CEH iLearn Course. So for CEH…
There are some situtations in which you need to modify Windows firewall configuration and you have only command-line access. In these cases, you can make use of the command netsh Command Prompt. netsh is available from Windows 2000 and above.…
Filters TCP Ports tcp.port Filters the tcp port/s of packets displayed. Example: tcp.port == “21” HTTP Request Methods http.request.method Possible values: get post Example: http.request.method == “POST” Contains cookies http.cookie Example: http.cookie External references…
Parameters -f switch sets the Do Not Fragment bit on the ping packet. By default, the ping packet allows fragmentation. In the ping command, the –l option means to send the buffer size in bytes. It is followed by the…
This post sums up the scattered information I have found regarding Certified Ethical Hacker (CEH) Practical Exam and my conclusions about how to prepare it. My intention is not to include real questions from the exam, but give advice to…
List of virus maker tools: DELmE’s Batch Virus Generator JPS Virus Maker Tool List of virus maker tools DELmE’s Batch Virus Generator DELmE’s Batch Virus Generator is a virus creation program with lots of options to infect the victim’s…
In the context of cybersecurity, footprinting is the technique used for gathering information about computer systems and the entities they belong to. This post may mix footprinting and reconnaissance tools. This post lists some footprinting tools. List of footprinting tools…
Web Server Penetration Testing: CORE Impact Immunity CANVAS Arachni WebSurgery List of Web Server Penetration Testing Tools CORE Impact Immunity CANVAS Arachni Home WebSurgery