Posts

Showing posts with the label SQL injection

Top 6 Web Vulnerability Scanner Tools

Image
Top 6 Web Vulnerability Scanner Tools Web Vulnerability Scanner Tools: Web site security is very important because the website contain relevant information about a company and now a days website defacement is very common even a script kiddies and a new born hackers can do this. The most common vulnerability like SQL-Injection and cross site scripting lead towards the defacement.  So you want to secure your web application than find vulnerabilities on it before a hacker find it, try to use some relevant tools and find vulnerabilities and fix it. There are so many tools available for both Windows and Linux platform and commercial and open source tool. Below is the best web vulnerability scanner tool that we have discussed before. OWASP Zed Attack Proxy- ZAP OWASP or Open Web Application Security Project is a non profit organisation world wide that are focusing on improving the security of web application, for more about OWASP click  ...

HOW TO DO BLIND SQL INJECTION MANUALLY

HOW TO DO BLIND SQL INJECTION MANUALLY ************************************************************************ Blind SQL Injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established. Blind SQL INJECTIONS: Suppose That You want to Hack This website with Blind SQLi http://example.com/index.php?id=5 when we execute this, we see some page and articles on that page, pictures etc then when we want to test it for blind sql injection attack http://www.e...