Table of Content Explain CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability How to Exploit Microsoft Support Diagnostic Tool? Explain CVE-2022-30190 Microsoft Support Diagnostic Tool Vulnerability: On Monday May 30, 2022, Microsoft issued CVE-2022-30190 regarding the Microsoft Support Diagnostic Tool (MSDT) in Windows...
Hello! Pentesters, In this article, We will hunt How to extract Database Name, Table_Name, Column_Name, and even USERNAME and PASSWORD from a Database. Some Basic SQL Command: user() version() database() 1) Find Out User Information union select user() union select database()...
Table of Content What is sqlmap in Kali? Dump Username And Password Using SQLMap What is sqlmap in Kali? SQLMap is an open-source tool that is used to both identify and exploit SQL injection vulnerabilities. SQLMap contains many advanced features such...
In this blog, we will cover the Previse HTB CTF challenge that is an easy machine. It is to Capture the flag types of CTF challenges. You will get to know a lot of learning in this CTF challenge. For example,...
Table of Content How Can I See List All Users In A MySQL Database? Today we are going to write another Hacking Blog for Newcomers. In this blog, I will explain, How to see lists of all users and passwords in...
Table of Content What is Proxychains? How to Install & Setup Proxychains NOTE:– you must in ROOT user. if you do not then switch to Root What is Proxychains? Proxychains is a free & open-source tool that allows us to run...
Table of Content What is the wfuzz tool? How to Brute force login page using wfuzz? What is the wfuzz tool? Wfuzz is a free & Open-Source tool that allows an attacker to brute-forcing Web Applications. It provides various features, for...
Table of Content What tools do hackers use? Most Popular Hacking Tools for Ethical Hacker In this blog, we will discuss the most popular hacking tool. It is often used to hack any network or decrypt the password hashes. Some of...