XXE Cheat Sheet - SecurityIdiots
Just another article bring together the tips and tricks to find/exploit XXE and bypass it.
Different Contexts for XSS execution
Here we will learn, different types of contexts where XSS may reflect. How to deal with them and how we can balance the injection.
XSS exploitation part 1
Finally, we are finished with basics of javascript for XSS and here we are with the first part of XSS exploitation.
Basics of Javascript for XSS - final
In this post we will finally finish up our requirements of Javascript for XSS, from our next post we will bang with XSS..
Basics of Javascript for XSS part 2
In this post we will cover some other requirements a attacker need to understand about Javascript for advanced XSS exploitation.
XSS Series by Securityidiots
Securityidiots is back with its all amazing tutorials, Monter maini is gonna cover basics to advanced XSS in this series.
Bypass Addslashes using Multibyte Character
I beleive this tutorial is nother unique or new as compared to some other tutorials on Securityidiots. Tutorial related to Addslash bypass can be found easily
MSSQL practical Second Order Exploitation
MSSQL out of band exploitation, very useful while you are not able to extract that data in all those old ways, here we are with a awesome fucking new way ;)
Oracle SQL Injection and DIOS Query
Here is a complete tutorial on how to injection in oracle based website, along with into to oracle DIOS.
MSSQL Second Order Exploitation
MSSQL Insert Query injection and Second order Exploitation tutorial with video...
Bypass Sucuri WebSite Firewall(WAF)
In this tutorial we'll bypass the latest WAF Sucuri. Which is becoming a pain in the ass to many Inj3ct0rs
Guide to WAF Bypass by SecurityIdiots
Heres one of the most requested tutorial yet, Lets start learning and exploring WAF techniques and bypasses.
One Payload to Inject them all - MultiQuery Injection
Multi Query injection, one of my favorites. Heres a little explanation on it and why its different from Routed SQLi
XPATH Injection : Iterating through element and Entities
Learn how to test XPATHi and confirm it, Inject and extract the data from XML using XPATHi
Shell the web - Methods of a Ninja
Learn what securities developers use against shell uploading and how can we bypass those securities to get our shell over that website.
MSSQL Error Based Injection
Many times you fall into a situation when Union doesnt work so herez basics of how to use error based MSSQL injection, and what are the conditions need to be met for an error based SQLi
Routed SQL Injection
Security Idiots is up with some of the most tricky parts of SQL injection, brace yourself to have some more fun with SQL injection.
Step By Step MSSQL Union Based Injection
A complete series on MSSQL Injection for those who are still not really comfortable with MSSQL Injection
Hand Guide To Local File Inclusion(LFI)
Guide to Local File Inclusion. Learn how to shell website using LFI and other Bypass tricks
Manual Inj3ct0rs Guide to recognize database
Learn how to recognize the database used by the application even when you can not see any kind of errors. Handy guide for manual SQL injectors.
DIOS the SQL Injectors Weapon (Upgraded)
Learn some more about DIOS and check out the other complete new flavors of SQLi DUMP In One Shot.
Steal IP Address using Image
Steal IP address of victim using an image, the same trick can be used with SQLi and XSS also.
DIOS (Dump in One Shot) Explained Part 2
Here we will learn Some more advanced tricks to use with our DIOS and make it a complete query to work with
Basics XPATH Injection
This is our first tutorial where will will be discussing how can we inject into XPATH queries with live example and scenario to make it easy to understand.
DIOS (Dump in One Shot) Explained
Most of the Inj3ct0rs are using DIOS but very few actually know how it is working or how can they change it to get the required output. so here is a tutorial which will help you on that
Basics of XPATH for XPATH Injection 1
In this tutorial we will understand the basics of XPATH and its all the relations and terms used in XPATH to better understand how to inject into XPATH queries
Basics of XPATH for XPATH Injection 2
In this tutorial we will understand the basics of XPATH Queries and then also start with the basics of XPATH injection
Union Based Oracle Injection
After all of our tutorials on injecting into MySQL database this tutorial concentrates on the basics of injecting in Oracle database
Group By and Order by SQL injection
Here we will learn how can an attacker inject into Order by and group by clause to extract the data using SQL injection
Dumping Database From Login Form
Earlier we discussed how to bypass Login Form using SQL Injection. Now in this tutorial we will learn how to Dump Database using SQLi
URL Spoofed Phishing using SQLi
In this tutorial we will learn how to Phish with the help of SQL injection in such a manner the victim wont be able to doubt your link by looking in the URL.
DDOS Using SQL injection (SiDDOS)
Regardless to many other attacks we can perform using SQLi there is an awesome attack DDOS which we can also perform via SQLi
Delete Query Injection
Usually Inj3ct0rs Inject into SQL statements and many times they miss to check the update and delete function to test. here we will discuss the same.
Update Query Injection
Usually Inj3ct0rs Inject into SQL statements and many times they miss to check the update and delete function to test. here we will discuss the same.
XSS Injection with SQLi (XSSQLi)
Over here we will only be concentrating over the SQL injection and how to perform a basic XSS attack using SQL injection, rest you can learn more on XSS to achieve a better results using the same XSS.
Time based Blind Injection
The way of exploitation will be same as blind injection just the injection is little changed. so as in blind we were getting to know that the question we asked the database returns true or not by the
Insert Query Injection
As we discussed all the other types of queries injection, in this one we will discuss how can a hacker manipulate the input to inject into a insert query and get the data.
Login Bypass Using SQL Injection
In this tutorial we will learn how a hacker can manipulate the input and inject it in such a manner that without username or password he can login
Evil Twin Injection
In this tutorial we will learn how to do get all the data into a website in a very faster way using the SQL evil twin injection
Blind SQL Injection
Blind SQL Injection is used when there is No Output and No Error. that means we cant Injection the Union based injection in which we use to get the output nor we can Inject the XPATH or Sub Query Inje
Error Based Injection SubQuery Injection
XPATH is not available in some versions of MySQL and may be filtered or disabled by admin that is why to overcome this problem we will use Sub Query Injection.
Error Based Injection using UpdateXML
When we are not able to extract the data using union based injection because the web application is not showing any output in such cases we can use XPATH injection
Error Based Injection using Extractvalue
When we are not able to extract the data using union based injection because the web application is not showing any output in such cases we can use XPATH injection
Deathrow Single Row injection
This type of injection you will commonly face and in this tutorial we will learn how to make the data extraction process faster even when its a deathrow injection
Basic Union Based Injection
This is the most basic and the fastest way to extract data from a website, in this tutorial we will learn to inject Union based injection after getting the number of columns.
Basic of SQL for SQL Injection part 3
In this part we will learn how to find out the type of comment to be used and how and why to find out the number of columns
Basic of SQL for SQL Injection part 2
In the last tutorial we learnt how to basic SQL queries works and how we can assume basic queries by looking at the URL
Basic of SQL for SQL Injection
Before one can start learning SQL injection having some basic knowledge of SQL queries and working is required by the user
Information Gathering with Fierce
Fierce is an Ultimate tool while the phase of Information gathering it can be used to check for the Zone Transfer as well as brute force list of Sub-Domains for a domain.