#penetration-testing
Read more stories on Hashnode
Articles with this tag
Enumeration: sudo nmap -sS -sV -sC -T4 --min-rate 5000 10.10.11.217 -vv Scanning topology.htb (10.10.11.217) [1000 ports] Discovered open port 22/tcp...
Scanning We'll start with scanning. First thing First we need to scan the target machine for open ports by using nmap ┌─[root@parrot]─[~] └──╼ sudo...
Reconnaissance As usually we gonna scan the target with the nmap └──╼ $sudo nmap -sS -sV -sC -T4 --min-rate 5000 10.10.14.231 -vv ... Discovered open...
Enumeration First thing we are going to gather information about the target system PC that has been assigned an IP address of 10.10.11.214 using Nmap....
Brief SQL Injection, commonly known as SQLi, involves executing malicious queries on a web application database server. When a web application fails...
Introduction (What is Command Injection?) In this section, we'll explore the web vulnerability known as command injection. We'll learn about its...