web app pentesting

Exploiting Content-based Blind SQL-injection.

The topmost vulnerability in OWASP top 10 vulnerability list is SQL injection and there is a strong reason for that too. SQL-injection is the most common vulnerability that was discovered on websites till date. The most vulnerable database is MySQL database system, other database systems are vulnerable to injections too but they are used in very less …

Exploiting Content-based Blind SQL-injection. Read More »

Javascript for Pentester Task 16

Hello Internet people, today I am going to post another solution to the task provided at Javascript for Pentester at Pentester Academy. In this task, we learn how to use, find and play with CSRF token.CSRF tokens are used to mitigate Cross-site request forgery, but these tokens also would be bypass if not used properly. You can view solutions to …

Javascript for Pentester Task 16 Read More »

Javascript for Pentester Task 15

Hello pentesters, today I am going to post another solution to the task provided at Javascript for Pentester at Pentester Academy. In this task, we learn more about how to use XML XMLHttpRequest method to fetch data and post to the attacker on the go without users concern. You can view solutions to the other tasks here. Task 15: Data Exfiltration …

Javascript for Pentester Task 15 Read More »

Javascript for Pentester Task 14

Hello Internet people, today I am going to post another solution to the task provided at Javascript for Pentester at Pentester Academy. In this task, we learn how to use XML XMLHttpRequest method to fetch data on the go without users concern. You can view solutions to the other tasks here. Task 14: Fetching Data with XMLHttpRequest | TASK LINK The task …

Javascript for Pentester Task 14 Read More »

Send us Query
close slider