When i started my journey, i was too much confused. I was waiting for a long time to get a proper guideline. Today i am sharing with you two the most impressive websites that you start you cyber security journey. 1. Try Hack Me (THM) 2. Hack The Box (HTB) Hack The Box website Link Try Hack Me website Link THM or HTM , which one is best ? Actually both are best for the beginners. If anyone likes to read blogs and comfortable with blogs , THM is best for him/her. THM comes with full concept of the topics then hands on with practical knowledge. On the other hand, HTM comes with practical hands on. You can hands dirty with practice and write-up as well. My suggestion I was starting with both. When i was getting bored with blogs or reading ,then i was going to the hack the box. My most of the rooms were practicing with try hack me . I like reading and comfortable with blogs. But hack the box pawn-boxes come with walk through, which is...
Path: Product Category filter Goal: display the database version string Step1: Determine the number of columns after the category name, we run a query Query: ‘ order by 1 - - then, select all and press Cntrl+U for URL encoding Response 200 OK It shows that the status HTTP/2 200 OK. It means the server responds to the malicious query. It also means that the server has 1 column. step 2: Then, we check the same query for the 2 columns. Query: ‘ order by 2 - - then, select all and press Cntrl+U for URL encoding It shows that the status HTTP/2 200 OK. It means the server responds to the malicious query. It also means that the server has 2 columns. Step 3: Then, we check the same query for the 3 columns. Query: ‘ order by 3 - - select all and press Cntrl+U for URL encoding 'It shows that the status HTTP/2 500 Internal Server Error. It means the server doesn’t respond to the query. It also means that the server doesn’t have 3 columns. Step 4: Determine the datatype...
This type of UNION attack is done using the UNION keyword, which lets you execute an additional SELECT query and append the results to the original query. For example , if an application executes the following query containing the user input "Gifts": SELECT name, description FROM products WHERE category = 'Gifts' Then an attacker can submit the input: ' UNION SELECT username, password FROM users-- Blind SQL : This means that the application does not return the results of the SQL query or the details of any database errors within its responses. First-order SQL injection: It arises when the application takes user input in an unsafe way. Second-Order SQL injection: It arises when the application takes user input from an HTTP request and stores it for future use. Later when handling a different HTTP request, the application retrieves the stored data and incorporates it into a SQL query in an unsafe way. Second-order SQL injection often arises in situation...
Comments
Post a Comment