Pentest_Testing_CorpforSQL Injection Prevention in Wordpresssql-injection-prevention-in-wordpress.hashnode.dev·Nov 10, 2024Secure Your WordPress Site: SQL Injection (SQLi) Explained and PreventedSQL Injection (SQLi) in WordPress: How to Protect Your Site from Database Attacks With WordPress being one of the most widely used platforms, it’s also a target for many cybersecurity threats, including SQL Injection (SQLi) attacks. These attacks exp...Discuss#cybersecurity
FIKARA BILALblog.fikara.io·Oct 9, 2024Master Recon : Outils et Techniques pour la reconnaissanceDans cet article, nous allons explorer divers outils qui permettent de collecter des informations sur des cibles spécifiques lors de la phase de reconnaissance. Nous commencerons par des outils de Linked Discovery, une méthode qui permet d’explorer e...Discuss·133 readsgospider
FIKARA BILALblog.fikara.io·Sep 5, 2024Penetration Testing avec MetasploitPré-requis Installation et Configuration de Metasploit sur Kali Linux Le pentesting, ou test d'intrusion est une méthode utilisée pour évaluer la sécurité d'un système ou réseau informatique. Le but est d'identifer des vulnérabilités et surtout de ...Discuss·161 readsmetasploit
FIKARA BILALblog.fikara.io·Sep 3, 2024Metasploit sur Kali LinuxMetasploit est un environnement de test d'intrusion sur Kali Linux. Il est utilisé pour tester et exploiter la vulnérabilité des systèmes en utilisant divers exploits et payloads. Un exploit est un module de codes qui abuse des vulnérabilités d'un s...Discuss·121 readsKali Linux
0xiNPro0xshin.hashnode.dev·Apr 6, 2024Fuzzing series - Vhost Fuzzing and filtering with Ffuf - 03Vhost fuzzing is a crucial technique for identifying both public and non-public sub-domains and virtual hosts (VHosts) that are served from the same server but do not have public DNS records. This document is structured to ensure clarity and thorough...DiscussCPTS Journeyfluf
Pratik MforThe Tech Deckthetechdeck.hashnode.dev·Nov 27, 2023How to Install Kali Linux on VMware Step-by-StepKali Linux is one of the most popular Linux distributions used for penetration testing and ethical hacking. It comes preloaded with hundreds of tools used to test network security. Installing Kali Linux on VMware Workstation allows you to run Kali in...Discuss·418 readsLinuxKali Linux
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023ExploitationOverview The exploitation phase is the phase where the tester tries to gain access to the system using the vulnerabilities identified in the previous phase. The exploitation phase is important because: It helps to determine the severity of the vulne...DiscussPenetration Testing PhasesExploitation
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023Vulnerability ScanningOverview Vulnerability scanning is a critical phase in the penetration testing process, where the primary goal is to identify potential vulnerabilities and weaknesses in the target system or application. The purpose of this phase is to determine the ...Discussvulnerability scanning
Matthew Hardmatthewhard.com·Apr 26, 202310 Important Pentesting Tools for Your Tool BagAs a pentester, having the right tools is key to getting the job done right. Whether you're testing the security of a web application or a wireless network, these 10 tools are a must-have in your tool bag. Nmap: This tool is like a Swiss Army knife ...Discuss·54 readspentesting