For web application penetration practice, we all look for vulnerable applications like DVWA and attempt to configure vulnerable practice environments. As we all know, it’s
This post will describe the various PHP web Shell uploading technique to take unauthorized access of the webserver by injecting a malicious piece of code
As you know that we have already shown you how to configure web server. Now it’s time to move on to the next step which
In this article, we learn how to use Commix from scratch by using all the basic commands and going all the way to the advanced
Today we are going to discuss “Payload Encoding” option followed by payload processing of Burpsuite which is advanced functionality comes under Intruder Tab for making brute force
Today we are going to discuss the Importance of Engagement tools which is a Pro-only feature of Burp Suite. It is mainly used in information gathering
Today we are going to discuss the “Payload Processing” option of Burpsuite which is advanced functionality comes under Intruder Tab for making brute force attack.
Burp_wp is an extension of burpsuite used to scan and find vulnerabilities in WordPress plugins and themes using a burpsuite proxy. It was created by
In our previous article part1, we had discussed how to perform a brute force attack on any web application server for making unauthorized login into