June 2019 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Archives
Monthly Archives: June 2019
Sqlmap
Sqlmap is a powerful penetration testing tool used to detect and exploit sql injection vulnerabilities. For demonstration, team1.pentest.id will be attacked using sqlmap sqlmap -u “team1.pentest.id/?author=1/” The result is that the sqlmap was unsuccessful due to error 403 forbidden.
Posted in Uncategorized
Leave a comment
Searchsploit
Searchsploit is a convenient tool used when a quick search of exploits are needed. For example if a person wants to check if there is any vulnerability in WordPress, they can use searchsploit. Searchsploit shows exploits for wordpress themes, plugins … Continue reading
Posted in Uncategorized
Leave a comment
Crunch
Crunch is a useful password list generator for generating password lists based on criteria. crunch min max options where minimum is the minimum amount of characters, maximum is the maximum amount of characters and options are the characters used for … Continue reading
Posted in Uncategorized
Leave a comment
Whois
Whois is a convenient tool used to search domain information. This tool shows registrar info, name server, expiration date and etc.
Posted in Uncategorized
Leave a comment
John The Ripper
John the ripper is a powerful tool used for offline cracking tool. It can autodetect a lot of hashes such as FreeBSD MD5-based and etc. For demonstration, the shadow file in /etc/shadow/ will be cracked in the VM. From this … Continue reading
Posted in Uncategorized
Leave a comment