Forwarded from Jeetendra Joshi
## Test For SQL Injection
[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL
Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r
#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL
Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r
#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
X (formerly Twitter)
Jeetendra Joshi ๐ฎ๐ณ (@SH3lLH4CK3R) on X
๐๐Bug Hunter | Smart Contract Security | CTF Player | Exploit Developer | Python Developer | Web Application Security | Solidity Developer |
Forwarded from Cybertix
๐ญ๐ฒ๐ฟ๐ผ-๐๐ฎ๐ ๐ฅ๐๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐๐ฒ
๐ฃ๐ฟ๐ผ๐ฑ๐๐ฐ๐: Palo Alto Global Protect
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฐ-๐ฏ๐ฐ๐ฌ๐ฌ
๐๐ถ๐ป๐ธ: https://youtube.com/shorts/H6Lskmn8ywU?si=CntyK-0hGQBWlgnU
๐ฃ๐ฟ๐ผ๐ฑ๐๐ฐ๐: Palo Alto Global Protect
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฐ-๐ฏ๐ฐ๐ฌ๐ฌ
๐๐ถ๐ป๐ธ: https://youtube.com/shorts/H6Lskmn8ywU?si=CntyK-0hGQBWlgnU
YouTube
0-Day RCE Vulnerability in Palo Alto Global Protect
๐๐ช๐ค๐๐ฅ๐๐๐๐ ๐ฝ๐๐ค๐: https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalp...
เคเคจเฅเคถเคเคธเฅเคฏเคฎเคจเฅเคเฅเคฐเฅเคถเค เคถเฅเคฐเฅเคคเค เคถเฅเคฒเค เคฆเคฎเค เคถเคฎเคเฅค
เคฐเคพเคเคตเค เคถเฅเคญเคฏเคจเฅเคคเฅเคฏเฅเคคเฅ เคทเคกเฅเคเฅเคฃเคพเค เคชเฅเคฐเฅเคทเฅเคคเฅเคคเคฎเคฎเฅเฅฅ
เคฐเคพเคฎ เคจเคตเคฎเฅ เคเฅ เคนเคพเคฐเฅเคฆเคฟเค เคถเฅเคญเคเคพเคฎเคจเคพเคฏเฅ โค๏ธ๐๐ป
เคเคฏ เคถเฅเคฐเฅ เคฐเคพเคฎ๐๐ป
เคฐเคพเคเคตเค เคถเฅเคญเคฏเคจเฅเคคเฅเคฏเฅเคคเฅ เคทเคกเฅเคเฅเคฃเคพเค เคชเฅเคฐเฅเคทเฅเคคเฅเคคเคฎเคฎเฅเฅฅ
เคฐเคพเคฎ เคจเคตเคฎเฅ เคเฅ เคนเคพเคฐเฅเคฆเคฟเค เคถเฅเคญเคเคพเคฎเคจเคพเคฏเฅ โค๏ธ๐๐ป
เคเคฏ เคถเฅเคฐเฅ เคฐเคพเคฎ๐๐ป
Forwarded from Cybertix
๐ข๐ฆ ๐๐ผ๐บ๐บ๐ฎ๐ป๐ฑ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ๐ฑ
They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.
๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ : 6500$
๐๐ถ๐ป๐ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.
๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ : 6500$
๐๐ถ๐ป๐ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
YouTube
GitLab Runner on Windows Host container OS Command Injection | Got Bounty of $6500 ๐ฑ #technology #ai
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:
https://hackerone.com/reports/955016
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
https://hackerone.com/reports/955016
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
Forwarded from OSINT AMBITION (Dheeraj Yadav)
The Wednesday Updates #3(2024) is out now.
https://osintambition.substack.com/p/the-wednesday-updates-658
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://osintambition.substack.com/p/the-wednesday-updates-658
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
OSINT Updates by OSINT Ambition
The Wednesday Updates #3(2024)
A hub for all weekly updates from OSINT community at single place.
Forwarded from K I N G S M A N ๐ฎ๐ณ (๐ผ๐๐๐ฃ๐ฉ ๐ผ๐จ๐๐ค๐ฉ)
Please open Telegram to view this post
VIEW IN TELEGRAM