WebApp Hacking

Mutillidae - User-Agent Impersonation

Mutillidae – User-Agent Impersonation

In this walk through, we will be going through the User-Agent Impersonation vulnerability section from Mutillidae Labs. We will be exploring and performing User-Agent Impersonation with User Agent Switcher and learn how application are affected because of it. So, let’s get started with the Hacking without any delay. Security Level: 0 (Hosed) Also Read: Mutillidae […]

Mutillidae – User-Agent Impersonation Read More »

Mutillidae - Unrestricted File Upload

Mutillidae – Unrestricted File Upload

In this walk through, we will be going through the Unrestricted File Upload vulnerability section from Mutillidae Labs. We will be exploring and exploiting Unrestricted File Upload and learn how application are affected because of it. So, let’s get started with the Hacking without any delay. Security Level: 0 (Hosed) Also Read: Mutillidae – SQLi

Mutillidae – Unrestricted File Upload Read More »

Mutillidae - Sqlmap Practice (View Blogs)

Mutillidae – Sqlmap Practice (View Blogs)

In this walk through, we will be going through the Sqlmap Practice (View Blogs) vulnerability section from Mutillidae Labs. We will be exploring and exploiting SQL Injection with Sqlmap in View Blogs utility and learn how application are affected because of it. So, let’s get started with the Hacking without any delay. Security Level: 0

Mutillidae – Sqlmap Practice (View Blogs) Read More »

SQLi via JSON (Pentest Tool lookup)

Mutillidae – SQLi via JSON (Pentest Tool lookup)

In this walk through, we will be going through the SQLi via JSON (Pentest Tool lookup) vulnerability section from Mutillidae Labs. We will be exploring and exploiting SQL Injection via JSON in Pentest Tool Lookup utility and learn how application are affected because of it. So, let’s get started with the Hacking without any delay.

Mutillidae – SQLi via JSON (Pentest Tool lookup) Read More »

Mutillidae - SQLi via JSON (Pentest Tool lookup AJAX)

Mutillidae – SQLi via JSON (Pentest Tool lookup AJAX)

In this walk through, we will be going through the SQLi via JSON (Pentest Tool lookup AJAX) vulnerability section from Mutillidae Labs. We will be exploring and exploiting SQL Injection via JSON in Pentest Tool Lookup utility and learn how application are affected because of it. So, let’s get started with the Hacking without any

Mutillidae – SQLi via JSON (Pentest Tool lookup AJAX) Read More »

Mutillidae - SQLi Insert Injection (View Captured Data)

Mutillidae – SQLi Insert Injection (View Captured Data)

In this walk through, we will be going through the SQLi Insert Injection (View Captured Data) vulnerability section from Mutillidae Labs. We will be exploring and exploiting SQL Injection in Capture Data page and learn how application are affected because of it. So, let’s get started with the Hacking without any delay. Security Level: 0

Mutillidae – SQLi Insert Injection (View Captured Data) Read More »

Mutillidae - SQLi Insert Injection (Register)

Mutillidae – SQLi Insert Injection (Register)

In this walk through, we will be going through the SQLi Insert Injection (Register) vulnerability section from Mutillidae Labs. We will be exploring and exploiting SQL Injection in Account Registration panel and learn how application are affected because of it. So, let’s get started with the Hacking without any delay. Security Level: 0 (Hosed) Also

Mutillidae – SQLi Insert Injection (Register) Read More »

Mutillidae - SQLi Insert Injection (Add to your blog)

Mutillidae – SQLi Insert Injection (Add to your blog)

In this walk through, we will be going through the SQLi Insert Injection (Add to your blog) vulnerability section from Mutillidae Labs. We will be exploring and exploiting SQL Injection in Blog and learn how application are affected because of it. So, let’s get started with the Hacking without any delay. Security Level: 0 (Hosed)

Mutillidae – SQLi Insert Injection (Add to your blog) Read More »

Mutillidae - Insecure Direct Object Reference (RFI)

Mutillidae – Insecure Direct Object Reference (RFI)

In this walk through, we will be going through the Insecure Direct Object Reference (RFI) vulnerability section from Mutillidae Labs. We will be exploring and exploiting Insecure Direct Object Reference (IDOR RFI) and learn how application are affected because of it. So, let’s get started with the Hacking without any delay. Security Level: 0 (Hosed)

Mutillidae – Insecure Direct Object Reference (RFI) Read More »

Scroll to Top