Sabtu, 01 Oktober 2011

Dork SQL Injection

inurl : index.php?id=
inurl : trainers.php?id=
inurl : buy.php?category=
inurl : article.php?ID=
inurl : play_old.php?id=
inurl : declaration_more.php?decl_id=
inurl : Pageid=
inurl : games.php?id=
inurl : page.php?file=
inurl : newsDetail.php?id=
inurl : gallery.php?id=
inurl : article.php?id=
inurl : show.php?id=
inurl : staff_id=
inurl : newsitem.php?num=
inurl : readnews.php?id=

Jumat, 30 September 2011

Using NMAP scan on Backtrack 5

Here are some really cool scanning techniques using Nmap

1) Get info about remote host ports and OS detection


nmap -sS -P0 -sV -O <target>



Where < target > may be a single IP, a hostname or a subnet

-sS TCP SYN scanning (also known as half-open, or stealth scanning)
-P0 option allows you to switch off ICMP pings.
-sV option enables version detection
-O flag attempt to identify the remote operating system Other option:
-A option enables both OS fingerprinting and version detection
-v use -v twice for more verbosity.


nmap -sS -P0 -A -v < target >

2) Get list of servers with a specific port open


nmap -sT -p 80 -oG – 192.168.1.* | grep open

Change the -p argument for the port number. See “man nmap” for different ways to specify address ranges.