Search results
-
L
OSINT - Introduction
What Are Open Source Intelligence (OSINT) Tools? Open Source Intelligence software, abbreviated as OSINT software, are tools that allow the collection of information that is publicly available or open-source. The goal of OSINT software is mainly to learn more about someone or a business...- Lexter
- Thread
- Replies: 0
- Forum: Cyber Intelligence
-
L
Broken Authentication and Session Management
The websites usually create a session cookie and session ID for each valid session, and these cookies contain sensitive data like username, password, etc. When the session is ended either by logout or browser closed abruptly, these cookies should be invalidated i.e. for each session there should...- Lexter
- Thread
- Replies: 0
- Forum: Web Hacking/Security
-
L
Cross Site Scripting
Cross Site Scripting is also shortly known as XSS. XSS vulnerabilities target scripts embedded in a page that are executed on the client side i.e. user browser rather then at the server side. These flaws can occur when the application takes untrusted data and send it to the web browser without...- Lexter
- Thread
- Replies: 0
- Forum: Web Hacking/Security
-
L
SQL injection - what is it ?
A SQL injection is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query. A SQL injection (SQLi) manipulates SQL code to provide access to protected resources, such as sensitive data, or execute...- Lexter
- Thread
- Replies: 0
- Forum: Web Hacking/Security
-
L
MySQL Penetration Testing with Nmap
In this article, we are discussing MYSQL penetration testing using Nmap where you will learn how to retrieve database information such as database name, table’s records, username, password and etc. MySQL is an open Source for Relational Database Management System that uses structured query...- Lexter
- Thread
- Replies: 0
- Forum: Web Hacking/Security
-
L
Wireless Penetration Testing: Wifite (part 2)
WPA/WPA2 Handshake Capture We have talked about handshakes in detail in our previous article here. Let’s see how we can capture handshakes using wifite. Here, we’ll simply type in the name of the tool since the default function is to scan the networks. But we’ll add the –skip-crack option here...- Lexter
- Thread
- Replies: 0
- Forum: Wireless Hacking/Security
-
L
Wireless Penetration Testing: Wifite (part 1)
Introduction Wifite is a wireless auditing tool developed by Derv82 and maintained by kimocoder. You can find the original repository here. In the latest Kali Linux, it comes pre-installed. It’s a great alternative to the more tedious to use wireless auditing tools and provides simple CLI to...- Lexter
- Thread
- Replies: 0
- Forum: Wireless Hacking/Security