Exploiting difficult SQL injection vulnerabilities using sqlmap: Part 1

Exploiting difficult SQL injection vulnerabilities using sqlmap: Part 1 :

Advertisements

M1ND-B3ND3R/BoopSuite

M1ND-B3ND3R/BoopSuite : Why use this over aircrack-ng? This project is easier to use, identifies clients more quickly than airodump-ng, and displays less useless information. Additionally I can take requests and build them out as I continue to develop this project.

Tainted Leaks: Disinformation and Phishing With a Russian Nexus – The Citizen Lab

Tainted Leaks: Disinformation and Phishing With a Russian Nexus – The Citizen Lab : Key Points Documents stolen from a prominent journalist and critic of the Russian government were manipulated and then released as a “leak” to discredit domestic and foreign critics of the government.

secrary/InjectProc

secrary/InjectProc : Process injection is a very popular method to hide malicious behavior of code and are heavily used by malware authors. There are several techniques, which are commonly used: DLL injection, process replacement (a.k.a process hollowing), hook injection and APC injection.

Breaking Out of Citrix and other Restricted Desktop Environments | Pen Test Partners

Breaking Out of Citrix and other Restricted Desktop Environments | Pen Test Partners : Solid mega post. Index Dialog Boxes Abusing Dialog Boxes Help Menus Environmental Variables / Bypassing Path Restrictions Gaining a Command Shell Bypassing Write Restrictions Bypassing Executable Restrictions Internet Explorer Microsoft Office Modifying ICA Files Default / Weak Credentials File Transfer – Getting data to and from your target Useful System / Administrative Tools Shortcuts RDP / Citrix Shortcuts Batch Files and Scripts Juicy Files and Data Binary Planting Conclusion