What’s an SQL Injection?

SQL Injection What is an SQL injection? URL encoding Types of SQL injections How basic SQL injections work   What is an SQL injection? This code injection technique is used to attack data-driven applications. Attackers can insert SQL statements into an entry field on a vulnerable website for execution. A common reason for using this... Continue Reading →

Metasploitable2 Notes/Walkthrough

This is really more of a post for me, here you can find my notes while following the metasploitable walkthrough found here: https://metasploit.help.rapid7.com/docs/metasploitable-2-exploitability-guide There are some definitions and summaries of some of the tools and vulnerabilities and than further down you can see the actual method of exploiting the vulnerabilities and using the tools. msfconsole Commands... Continue Reading →

What is Nmap?

"Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service up time. Nmap uses raw IP packets in novel ways to determine what hosts... Continue Reading →

Setting Up Metasploitable2 + Kali

So lately I have been playing with Metasploitable 2. This is an image that is purposely designed to contain vulnerabilities that are easily exploitable for learning purposes. You can download the virtual machine image here. The download provides the VMX file which is perfect as I am doing these practice simulations in a virtual machine. Therefore... Continue Reading →

Create a website or blog at WordPress.com

Up ↑