Skip to content
Tuesday, May 13, 2025
Latest:
  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file

Eduguru

Tech Blog and Discussion

  • Blog
  • Discussion
  • Asterisk Support
  • Contact Us
  • Quiz
    • C Program
    • C – Input/Output
    • PHP Program
    • Basic SQL

Website

Tutorial Web Hosting Website 

Injecting into XPath

May 7, 2020 Krishna Blind XPath Injection, Finding XPath Injection Flaws, Informed XPath Injection, Injecting Code, Injecting into XPath, Preventing XPath Injection, Subverting Application Logic, web-app, web-app-hacking, web-site, web-site hacking

The XML Path Language (or XPath) is an interpreted language used for navigating around XML documents, and for retrieving data

Read more
Tutorial Web Hosting Website 

Injecting into SOAP

May 7, 2020May 7, 2020 Krishna Finding and Exploiting SOAP Injection, Injecting Code, Injecting into SOAP, Preventing Script Injection Vulnerabilities, Preventing SOAP Injection, web security, web-app, web-app-hacking, web-app-security, web-site, web-site hacking

The Simple Object Access Protocol (SOAP) is a message-based communications technology that uses the XML format to encapsulate data. It

Read more
Tutorial Web Hosting Website 

File Inclusion Vulnerabilities

May 7, 2020May 7, 2020 Krishna ETHICAL HACKING, File Inclusion Vulnerabilities, Finding File Inclusion Vulnerabilities, HACKING, Local File Inclusion, Preventing Script Injection Vulnerabilities, Remote File Inclusion, web-app, web-app-hack, web-app-hacking, web-site, web-site-hack

Many scripting languages support the use of include files. This facility enables developers to place reusable code components into individual

Read more
Tutorial Web Hosting Website 

Injecting into Web Scripting Languages

May 7, 2020 Krishna Dynamic Execution in ASP, Dynamic Execution in PHP, Dynamic Execution Vulnerabilities, ETHICAL HACKING, Finding Dynamic Execution Vulnerabilities, hack, HACKING, http, Injecting Code, Injecting into Web Scripting Languages, web-app, web-site, web-site-hack, webapp hack

The core logic of most web applications is written in interpreted scripting languages like PHP, VBScript, and Perl. In addition

Read more
Tutorial Web Hosting Website 

Bypassing Filters

May 6, 2020 Krishna Avoiding Blocked Characters, Bypassing Filters, Circumventing Simple Validation, cyber security, ethical hacker, Exploiting Defective Filters, hack, hacker, Manipulating Blocked Strings, Using Dynamic Execution, Using SQL Comments, web application, web-app, web-site, web-site-hack

In some situations, an application that is vulnerable to SQL injection may implement various input filters that prevent you from

Read more
Tutorial Web Hosting Website 

Exploiting ODBC Error Messages (MS-SQL Only)

May 6, 2020 Krishna Enumerating Table and Column Names, ETHICAL HACKING, Exploiting ODBC Error Messages (MS-SQL Only), Extracting Arbitrary Data, HACKING, Injecting Code, Using Recursion, web, web-app, web-app-hack, web-site, web-site hacking

If you are attacking an MS-SQL database, then there are alternative ways available of discovering the names of database tables

Read more
Tutorial Web Hosting Website 

Extracting Useful Data

May 6, 2020 Krishna An MS-SQL Hack, An Oracle Hack, ETHICAL HACKING, Extracting Useful Data, HACKING, Injecting Code, security, wab-hack, web, web-app, web-app-hack, web-site, web-site-hack, website

In order to extract useful data from the database, you normally need to know the names of the tables and

Read more
Tutorial Web Hosting Website 

Fingerprinting the Database

May 6, 2020 Krishna Fingerprinting the Database, HACKING, html, Injecting Code, Linux, MS-SQL, Oracle, security, web, web-app, web-app-hack, web-site-hack

Most of the techniques described so far are effective against all of the common database platforms, and any divergences have

Read more
Tutorial Web Hosting Website 

The UNION Operator

May 6, 2020May 6, 2020 Krishna Injecting Code, The UNION Operator, web-app, web-app-hack, web-app-security, web-app-site, web-site

The UNION operator is used in SQL to combine the results of two or more SELECT statements into a single

Read more
Tutorial Web Hosting Website 

Finding SQL Injection Bugs

May 6, 2020 Krishna DELETE Statements, Finding SQL Injection Bugs, Injecting Code, Injecting into Different Statement Types, INSERT Statements, Numeric Data, SELECT Statements, SQL, SQL statements, String Data, web-app, web-app-hack, web-hack, web-site

In the most obvious cases, a SQL injection flaw may be discovered and conclusively verified by supplying a single item

Read more
  • ← Previous
  • Next →

Recent Article

  • How to resolve -bash: netstat: command not found centos stream 9
  • python script to STT output in a text file
  • New Install Asterisk 18 from source on CentOS Stream 8
  • How to save audio stream from Asterisk to a file via WebSocket
  • create web socket and save data in a text file
  • How to capture and analyze traffic with tcpdump
  • Installing Asterisk 20 From source On Rocky 9
  • html drop down with search from table php mysql
  • How to Install and Use FFmpeg on CentOS 8
  • How to get duration of MP3 or wav any audio File in PHP
  • How to Change location Of MariaDB Data Directory
  • How to check partition details of MySQL table
  • internal server error when download large file php
  • iostat : How to monitor disk activity and CPU load average
  • Webrtc with Asterisk 16 : complete configuration with SIP

Tags

1st Semester Question Paper asterisk basics of java C# coronavirus c program c program example c programming c tutorial c tutorials cyber security download bca question paper Download bca Question Paper december 2017 download ignou bca question dec 2017 download previous year question paper Download Question Paper december 2017 Download Question Paper June 2017 ETHICAL HACKING HACKERS HACKING html ignou IT- Security Java java basics java program java programming java tutorials learn c let us C Linux MySQL NEW TECHNOLOGY Question Paper Download RESEARCH AND INNOVATION security Software software testing technology testing ubuntu UNIX web-app web-site Write a C Program
Copyright © 2025 Eduguru. All rights reserved.
Theme: ColorMag by ThemeGrill. Powered by WordPress.