Hi, I'm Khan.

Security Engineer, Bug Bounty Hunter

I spend a lot of time programming and breaking the applications logic.

Read more about me
Faraz Khan's Picture

Dumping Database From Login Form

Earlier we discussed how to bypass Login Form using SQL Injection. Now in this tutorial we will learn how to Dump Database using SQLi

URL Spoofed Phishing using SQLi

In this tutorial we will learn how to Phish with the help of SQL injection in such a manner the victim wont be able to doubt your link by looking in the URL.

DDOS Using SQL injection (SiDDOS)

Regardless to many other attacks we can perform using SQLi there is an awesome attack DDOS which we can also perform via SQLi

Delete Query Injection

Usually Inj3ct0rs Inject into SQL statements and many times they miss to check the update and delete function to test. here we will discuss the same.

Update Query Injection

Usually Inj3ct0rs Inject into SQL statements and many times they miss to check the update and delete function to test. here we will discuss the same.

XSS Injection with SQLi (XSSQLi)

Over here we will only be concentrating over the SQL injection and how to perform a basic XSS attack using SQL injection, rest you can learn more on XSS to achieve a better results using the same XSS.

Time based Blind Injection

The way of exploitation will be same as blind injection just the injection is little changed. so as in blind we were getting to know that the question we asked the database returns true or not by the

Insert Query Injection

As we discussed all the other types of queries injection, in this one we will discuss how can a hacker manipulate the input to inject into a insert query and get the data.

Login Bypass Using SQL Injection

In this tutorial we will learn how a hacker can manipulate the input and inject it in such a manner that without username or password he can login

Evil Twin Injection

In this tutorial we will learn how to do get all the data into a website in a very faster way using the SQL evil twin injection

Blind SQL Injection

Blind SQL Injection is used when there is No Output and No Error. that means we cant Injection the Union based injection in which we use to get the output nor we can Inject the XPATH or Sub Query Inje

Error Based Injection SubQuery Injection

XPATH is not available in some versions of MySQL and may be filtered or disabled by admin that is why to overcome this problem we will use Sub Query Injection.

Error Based Injection using UpdateXML

When we are not able to extract the data using union based injection because the web application is not showing any output in such cases we can use XPATH injection

Error Based Injection using Extractvalue

When we are not able to extract the data using union based injection because the web application is not showing any output in such cases we can use XPATH injection

Deathrow Single Row injection

This type of injection you will commonly face and in this tutorial we will learn how to make the data extraction process faster even when its a deathrow injection

Basic Union Based Injection

This is the most basic and the fastest way to extract data from a website, in this tutorial we will learn to inject Union based injection after getting the number of columns.

Basic of SQL for SQL Injection part 3

In this part we will learn how to find out the type of comment to be used and how and why to find out the number of columns

Basic of SQL for SQL Injection part 2

In the last tutorial we learnt how to basic SQL queries works and how we can assume basic queries by looking at the URL

Basic of SQL for SQL Injection

Before one can start learning SQL injection having some basic knowledge of SQL queries and working is required by the user

Information Gathering with Fierce

Fierce is an Ultimate tool while the phase of Information gathering it can be used to check for the Zone Transfer as well as brute force list of Sub-Domains for a domain.

Information Gathering with FOCA

Foca is an awesome tool which can help you getting information about your target, Foca not only helps you with Network mapping and Subdomains gathering but it also do Metadata Reconnaissance .

Information Gathering with Metagoofil

Metagoofil is a tool which is really helpful while your task of Information Gathering, it uses the search engine to get the information as per our parameters provided to it.

Cloudflare Bypass Security Part 2

This tutorial is for those who do not know about cloudflare, if you know enough about Cloudflare and its security then you can skip this part.

Cloudflare Bypass Security Part 3

Hello and welcome to my Forth tutorial on Cloudflare In this tutorial we will try to Bypass Cloudflare and get the real IP Address by attacking the Email Server.

Cloudflare Bypass Security

This tutorial is for those who do not know about cloudflare, if you know enough about Cloudflare and its security then you can skip this part.

Understanding Cloudflare Security

This tutorial is for those who do not know about cloudflare, if you know enough about Cloudflare and its security then you can skip this part.

Understanding Information Gathering

In this Tutorial we will discuss the basics of information gathering, and the real purpose behind the phase of Information Gathering will be discussed in a proper manner.

Information Gathering with online websites

Gathering Information can be made easier using some online websites which provide us with some very nice information about a website. This process can boost our whole phase of Information Gathering.

Information Gathering with Google

How an attacker can use google to gather sensitive information about a website, using google dorks. The basics of Advanced Googling.

Information Gathering with NMAP

Scanning open posts getting the server information and versions of services running over the server. Overview of using NMAP as a Information Gathering tool.