Cross Side Scripting Attacks

3 types of XSS → Reflected XSS→ iNJECT SOMETHING MALICIOUS AND we get a pop up and its reflected to us its never stored on the server and will be reflected on the page so its on the client side Stored XSS→This is the opposite of Reflected this will inject malicious payload in the server and even if we leave and come back the payload will still be there. Dom XSS→ Client Side it basically effects the DOM of the website ....

April 24, 2021 · 2 min · Nickapic

Git Hacking

So to enumerate over .git folder and also to dump them to your desktop and stuff we use tools from this repository GitTools and we can just git clone this repositry and use all the tool and the guides for them are given in the repo. But in general we can use gitfinder tool to find websites with their .git repository available to the public. It identifies websites with publicly accessible ....

April 24, 2021 · 2 min · Nickapic

Nessus

Introduction and Installations Nessus is a scanning tool that we can utilize for external and internal assesments. To download and install it we go to google type nessus download and t hen we find this site called Tenable we find the image which is compatible with our debian system and download that then go to the terminal traverse to the download directory and then do dpkg -i Nessusfilename and then we type in the path it gives us in the terminal again like shown below...

April 24, 2021 · 2 min · Nickapic

Networking Basics

Introduction- A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Switch is what connects the devices with a ethernet cable connected to all the devices in the network. To do a network Wirelessly you can use a router...

April 24, 2021 · 4 min · Nickapic

SQL Injections Level-1

What it is ? Sql injection is an attack in which malicious SQL Statements are injected into a SQL database to gain stuff like sensitive information,modify databases,and potentially even get a shell.They are very easy to avoid though but stilll happpen a lot. Common Syntax and Verbs→ SELECT → Retrivies data from a table for us INSERT → Adds data to a table DELETE → Removes data from a data table...

April 24, 2021 · 4 min · Nickapic