Category: Penetration testing

Two proxy methods of sqlmap 0

Two proxy methods of sqlmap

Article directory foreword 1. The first way is to directly hang the agent 2. The second method is to indirectly hang the agent foreword [The principle of sqlmap] is similar to brute force cracking....

sqlmap usage tutorial (super detailed) 0

sqlmap usage tutorial (super detailed)

sqlmap usage tutorial (super detailed) -u specifies the target URL (can be http protocol or https protocol) -d connect to database –dbs list all databases –current-db list the current database –tables list the current...

NoSQLAttack tool download and use 0

NoSQLAttack tool download and use

Today, I will continue to introduce the relevant knowledge of Linux operation and maintenance. The main content of this article is to download and use the NoSQLAttack tool. Disclaimer: The content introduced in this...