challanges

Exploiting Content-based Blind SQL-injection.

The topmost vulnerability in OWASP top 10 vulnerability list is SQL injection and there is a strong reason for that too. SQL-injection is the most common vulnerability that was discovered on websites till date. The most vulnerable database is MySQL database system, other database systems are vulnerable to injections too but they are used in very less …

Exploiting Content-based Blind SQL-injection. Read More »

Javascript for Pentester Task 15

Hello pentesters, today I am going to post another solution to the task provided at Javascript for Pentester at Pentester Academy. In this task, we learn more about how to use XML XMLHttpRequest method to fetch data and post to the attacker on the go without users concern. You can view solutions to the other tasks here. Task 15: Data Exfiltration …

Javascript for Pentester Task 15 Read More »

Javascript for Pentester Task 12

Hello Pentesters, today I am going to post another solution to the task provided at Javascript for Pentester at Pentester Academy. This task is bit different, you will learn how to grab the auto-fills of the website if it is vulnerable to XSS. Modern web browsers do not seem to autofill the username & passwords, you may have to try some old browser …

Javascript for Pentester Task 12 Read More »

Javascript for Pentester Task 11

Hello Pentesters, today I am going to post another solution to the task provided at Javascript for Pentester at Pentester Academy. The task is easy, we have to change the only image provided on the targeted page. You can view solutions to the other tasks here. Task 11: Replace Banner Image | Task Link This task is of level easy, we can …

Javascript for Pentester Task 11 Read More »

This Festive Season Get Up To 30% OFF🎉🎉

X
Send us Query
close slider