Articles

  • Dec 7, 2024 | medium.com | Divya Patel

    After the lab get started …Open the Burp Suite and close the intercept if it is on. Agenda: Buy the “Lightweight l33t leather jacket”. Let Get Started:First of all ,Login in the account by the given credentials. For example: wiener:peter. Go to the Home and try to buy the jacket but there is a cache that you can’t buy that as the price of the jacket is higher than the given store credit. So we have bypass that and buy the jacket. Now click on the view details of jacket and add in the cart.

  • Nov 21, 2024 | medium.com | Divya Patel

    Divya Patel·Follow3 min read·--Once the lab get started -> My AccountIn the BurpSuite turn off the intercept if it is on. On the My Account page you will find the login page, enter Carlos as username and any incorrect password for 4 times in row. You will notice the following error:Now go to burp suite and observe the request then you will find the username & password are sent in JSON format as:First send the above request to the repeater and change the username from wiener to carlos .

  • Nov 21, 2024 | medium.com | Divya Patel

    Divya Patel·Follow4 min read·--It is Medim Level security lab. Once the lab get started login with the given credentials in the lab:weiner:peter. Open up the burpsuite and turn off the intercept if it is on. After that open the proxy tab and open the browser, copy the lab url and paste in the browser. Here login with the given credentials and click on the login button. After login you will get the email change functionality in the my account page.

  • Nov 20, 2024 | medium.com | Divya Patel

    Divya Patel·FollowJust now--After the lab get started turn off the intercept ,if it is turn on in the BurpSuite. After that you will notice that there is a serach bar where you can test for the reflected xss vulnerability. In that serach bar enter any thing as you like for test. You cn see that the word that you have been written in the serach bar is reflecting. From that you have get the idea that it is reflected xss. Now enter the paylod — <script>alert(“You have hacked ”)</script> and Click Enter.

  • Nov 20, 2024 | medium.com | Divya Patel

    Divya Patel·Follow3 min read·--In this arcticle you will learn how to bypass system and get the sensitive information using the sql injection in the DVWA. First of all you can checkout my lastest arcticle on medium which is related to this. This is the link of that :First of all I am requesting that first understand that arcticle to know this better.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →