Hy everyone , I found a .git file on one domain but I don't know how to exploit it . Anyone please help
Читать полностью…Hey am going through the course of Rana khalil and I’ve one doubt the sql injection in which she teach finding column, retrieving data from other tables
These things works in real life scenarios or any other ways to get this work in real life scenario
Anyone can help please?
I am pentesting a website
And it have a login page for workers login
If we type any email id not belongs to its database it will throw an error saying email id not recognised
And it only have a input box to enter email address.and a submit button
And it have a hidden password field
A parameter is passing in post request also named "hidden_pw"
Is any way to expolit
I have tried email ennumeration but it has rate limit implimented .any one help me to understand the purpose of this parameter
Thanks for your reply I need another help could you please suggest me the wordlist for directory and subdomain brute forcing
Читать полностью…Hi my friends
Has anyone explored the nuclei template? what is the password?
graphite-browser-default-credential
As far as I know, this could possibly work good for outdated and poorly maintained systems aka legacy systems (eg: rare E-Commerce site which is built on older platform and older CMS)
Читать полностью…In Google Cloud Where is the main "Wordlist" of DirSearch !!?
It's not in share or lib or etc .!
Don't just end the test when u got 200 Ok look for any difference in the response time or application behavior and try to imagine what is happening on the back-end
Читать полностью…