Kayıtlar

Aralık, 2019 tarihine ait yayınlar gösteriliyor

Corsy - CORS Misconfiguration Scanner

Resim

ScanQLi - SQLi Scanner to Detect SQL Vulnerabilites

Resim

CORStest - A Simple CORS Misconfiguration Scanner

Resim

ReconCobra - Complete Automated Pentest Framework for Information Gathering

Resim

Create a Free Hacking Machine with Google Cloud!

Resim
Hello, Today I will tell you how to create a hacking machine using google cloud. First thing you need to do is go to  https://cloud.google.com/ . The next step is to click “Console” in the picture above and wait for your virtual console to open. Google Cloud gives us this opportunity for free. We may have wanted to take advantage of this opportunity. There’s a tool we’re going to use in this name, katoolin. This tool allows us to install the tools that are installed on kali linux. So what do we do now? "sudo su" command with after receiving our authority “git clone  https://github.com/LionSec/katoolin.git ” saying we are doing cloning process to our own system. Then run the command “sudo cp katoolin / katoolin.py / usr / bin / katoolin.. We put it in / usr / bin. The reason for this is to make an executable script from each directory path. Finally, we say “sudo chmod + x / usr / bin / katoolin” and give the executable authority to the tool we copied along ...

Getting Registered Wi-Fi Password Information via Powershell

Resim
Hello, In this article I wanted to tell you how to learn the Wi-Fi password information stored on the computer via powershell. In fact, there are many tools that do this. But it is possible to do so without driving. In Windows, open a PowerShell window to find a password that does not use third-party software. To do this, right-click the Start button or press Windows + R, and then type “powershell una in the search box and press enter. Run the following command to see a list of network profiles stored on your system: The code I used: (netsh wlan show profiles) | Select-String “\:(.+)$” | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name=”$name” key=clear)} | Select-String “Key Content\W+\:(.+)$” | %{$pass=$_.Matches.Groups[1].Value.Trim(); $_} | %{[PSCustomObject]@{ PROFILE_NAME=$name;PASSWORD=$pass }} | Format-Table -AutoSize As you can see above, I learned the Wi-Fi access information stored on my computer. By doing this you can l...

Powershell üzerinden Kayıtlı Wi-Fi Parola Bilgilerini Öğrenmek

Resim
Merhabalar, Bu yazımda sizlere powershell üzerinden bilgisayarda kayıtlı olan Wi-Fi parola bilgilerini öğrenmeyi anlatmak istedim. Aslında bunu yapan bir çok araç var. Ama araç kullanmadan bunu yapabilmek mümkün. Windows’ta üçüncü taraf yazılımı kullanmayan bir şifre bulmak için bir PowerShell penceresi açın. Bunu yapmak için, Başlat düğmesini sağ tıklayın veya Windows + R tuşlarına basın ve ardından arama kutucuğuna “powershell” yazın ve enter’a basın. Sisteminizde kayıtlı ağ profillerinin listesini görmek için aşağıdaki komutu çalıştırın: Kullanmış olduğum kod : (netsh wlan show profiles) | Select-String “\:(.+)$” | %{$name=$_.Matches.Groups[1].Value.Trim(); $_} | %{(netsh wlan show profile name=”$name” key=clear)} | Select-String “Key Content\W+\:(.+)$” | %{$pass=$_.Matches.Groups[1].Value.Trim(); $_} | %{[PSCustomObject]@{ PROFILE_NAME=$name;PASSWORD=$pass }} | Format-Table -AutoSize Yukarıda gördüğünüz üzere bilgisayarımda kayıtlı olan Wi-Fi erişim bilgile...

Twitter Bulk Unfollow Code

Resim
"""" setInterval(function () { t = $(".following").find(".follow-button"); if (!t[0]) { window.scrollTo(0, $(document).height()); } else { console.log(t.attr("class")); t.trigger("click"); } }, 1000) """

Twitter Unfollow Code

Resim
'''' setInterval(function() { $(".FollowStatus").each(function(){ $(this).parents(".Grid-cell.u-size1of2.u-lg-size1of3.u-mb10").remove(); }); $("div:not(.not-following) > .user-actions-follow-button").click(); }, 20000); setInterval(function() { $(".Grid-cell.u-size1of2.u-lg-size1of3.u-mb10").remove(); }, 30000); setInterval(function() { window.scrollTo(0,document.body.scrollBottom); },5000); setInterval(function() { window.scrollTo(0,document.body.scrollHeight); },1000); '''

PHP Security Check List [ EN ]

Resim
PHP: Hypertext Preprocessor is a web-based, server-side, multi-use, general-purpose, scripting and programming language that can be embedded in HTML. The PHP development, which was first created by Rasmus Lerdorf in 1995, is now being run by the PHP community. The PHP programming language is still used by a large developer. It is the most known backend programming language. In PHP web applications, I prepared a list called "php security check list" which security researchers should know. Full Path Disclosure Arbitrary File Upload Arbitrary File Delete Arbitrary File Download Local File Inclusion Remote File Inclusion Cookie Injection Session hijacking Header Injection SQL Injection XML Injection XXE Injection Email Injection HTML Injection xPath Injection Code Injection Command Injection Object Injection Cross Site Scripting Cross Site Request Forgery Broken Authentication and Session Management Session Hijacking Attack Source :  https://g...

Lecture Notes Of MSSQL Database

Resim
I wanted to gather the notes of the MS SQL training I have taken at Istanbul Şehir University in this github repo. I hope it’s a helpful. Please feel free to issue issues regarding repo issues and development suggestions. Source :   https://github.com/mssql-hub/mssql-courses

SQL Injection Payload List

Resim
In this section, we’ll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection. What is SQL injection (SQLi)? SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application’s content or behavior. In some situations, an attacker can escalate an SQL injection attack to compromise the underlying server or other back-end infrastructure, or perform a denial-of-service attack. SQL Injection Type : In-band SQLi (Classic SQLi) :  In-band SQL Injection is the most co...