Networking 101: How to spoof your IP address using NMAP in Windows Sometimes when building firewall rules in a big network it's difficult to tell what will happen to routing and inside a firewall just by looking at the rules. In many cases somebody wants a server with some IP address to talk to another server somewhere on the network. The best thing to do is traceroute, or telnet to the service ports from the source host and see what the firewall does with the traffic. Does it ever see the packet? If so does it allow or block it? This becomes more difficult when you don't have access to the source host, and/or the people in charge of it are unwilling/unable to run a trace. As in maybe they don't know how or just don't respond to your questions in time. If you try to explain 'telnetting to a port' it can confuse a lot of DBA's :-O So here's the next best thing - you can try it yourself, but "spoof" the source IP address of the reque...
SQL Injection in Kali Linux using sqlmap SQL injection is a code injection technique, used to attack data driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injection must exploit a security vulnerability in an application’s software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed. SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL databases. In this guide I will show you how to SQLMAP SQL Injection on Kali Linux to hack a website (more specifically Database) and extract usernames and passwords on Kali Linux. What is SQLMAP sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database s...
Comments
Post a Comment