top of page

SQLiv | SQL Injection

Before we are doing the injection consult, of course we must ensure that the server or target has a database security hole. To find database security holes, there are several methods we can use. Among them, Google dorking, is used mostly by hacker and penetration testers. Luckily there is a tool that is able to do that automatically. But we have to install its tool first. The tool is called SQLiv (SQL injection Vulnerability Scanner).


Install:

Then run:

Resolve some dependencies:


Finding SQL Injection Vulnerabilities:


Quick reference:


Reverse domain and scanning:

- Do reverse domain and look for websites that hosted on same server as target url


102 views0 comments

Recent Posts

See All

Cyrillic Alphabet

Exploring the Cyrillic Alphabet: A Beginner's Guide Have you ever come across the Cyrillic alphabet and wondered what it's all about? Maybe you've seen it on Russian websites, or perhaps you've notice

MacOS | Recording a Packet Trace

A packet trace is a record of traffic traveling across the network. It’s useful for investigating complex network problems related to both correctness and performance. Once you start a packet trace on

DNS Guard

Absolutely everything is connected to the internet these days, from TV to smart light bulbs, from mobile devices to smart cars. Given those ads and ad trackers are everywhere on the Internet, a browse

3 Comments


PRASAD PATHAK
PRASAD PATHAK
Apr 24, 2021

sudo python2 setup.py -i

[sudo] password for prasad:

Traceback (most recent call last):

File "setup.py", line 4, in <module>

import pip

ImportError: No module named pip


please help

Like
PRASAD PATHAK
PRASAD PATHAK
Apr 24, 2021
Replying to

Hi Diniz, I am fine, hope you are fine too.

I have tried to install pip but it says it's already installed.

Like
bottom of page