776 links
  • Shared Bookmarks
  • Home
  • Login
  • RSS Feed
  • ATOM Feed
  • Tag cloud
  • Picture wall
  • Daily
Links per page: 20 50 100
7 results tagged sqli x
  • thumbnail
    SQL injection: 9 ways to bypass Web Application Firewall • Penetration Testing
    April 19, 2022 at 3:25:45 PM UTC - permalink -
    QRCode
    - https://securityonline.info/sql-injection-9-ways-bypass-web-application-firewall/
    sql injection sqli bypass waf
  • thumbnail
    kleiton0x00/Advanced-SQL-Injection-Cheatsheet: A cheat sheet that contains advanced queries for SQL Injection of all types.
    January 9, 2022 at 1:58:19 PM UTC - permalink -
    QRCode
    - https://github.com/kleiton0x00/Advanced-SQL-Injection-Cheatsheet/
    sqli cheatsheet
  • thumbnail
    (1) Exfiltration at Lightspeed - Faster Blind SQL Injection : netsec
    July 5, 2021 at 1:50:19 PM UTC - permalink -
    QRCode
    - https://www.reddit.com/r/netsec/comments/4bquht/exfiltration_at_lightspeed_faster_blind_sql/
    blind sqli exfiltration
  • thumbnail
    SugarCRM's Security Diet - Multiple Vulnerabilities
    March 17, 2021 at 3:43:05 PM UTC - permalink -
    QRCode
    - https://blog.ripstech.com/2017/sugarcrm-security-diet-multiple-vulnerabilities/
    sugarcrm sugar exploits ripstech xss sqli file read
  • thumbnail
    Advanced MSSQL Injection Tricks – PT SWARM
    November 13, 2020 at 3:47:35 PM UTC - permalink -
    QRCode
    - https://swarm.ptsecurity.com/advanced-mssql-injection-tricks/
    sqli sql mssql injection tricks
  • thumbnail
    HoangKien1020/CVE-2020-10239: CVE-2020-10239: Incorrect Access Control in com_fields SQL field-RCE- PoC

    3.7.0 to 3.9.15

    November 12, 2020 at 9:30:30 AM UTC - permalink -
    QRCode
    - https://github.com/HoangKien1020/CVE-2020-10239
    joomla sqli rce
  • thumbnail
    Red Team Tales 0x01: From MSSQL to RCE - Tarlogic Security - Cyber Security and Ethical hacking
    EXEC sp_configure 'show advanced options', 1; RECONFIGURE;
    EXEC sp_configure 'xp_cmdshell', 1; RECONFIGURE;

    The procedure to achieve it is as follows:

    Declare a variable of “table” type to save the output that returns the xp_cmdshell procedure (remember that it returns the result in several rows).
    Dump the output of the command to the previous variable.
    Concatenate the rows of the table, separated by a line break.
    Encode the resulting string in Base64 and save it in a variable.
    Generate the certutil command, appending the string with the result.
    Execute it.
    March 28, 2019 at 12:15:52 AM UTC - permalink -
    QRCode
    - https://www.tarlogic.com/en/blog/red-team-tales-0x01/
    htb querier giddy sql sqli mssql windows hacking redteam pentest rce xp_cmdshell
Links per page: 20 50 100
Shaarli - The personal, minimalist, super fast, database-free, bookmarking service by the Shaarli community - Help/documentation