Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: Utkarsh Agrawal

Mutillidae XSS filter bypass

Posted on May 1, 2017 by Utkarsh Agrawal

I’m using the mutillidae to increase my hacking skills. I am trying to exploit the XSS in the username field in the registration form field with the toogle security 5. I tried every thing that I know, but I still didn’t manag… Continue reading Mutillidae XSS filter bypass→

Posted in web browser, web-application, xss

NSE (nmap script engine) vs. MSF Auxiliaries?

Posted on February 28, 2017 by Utkarsh Agrawal

Are the Nmap scripts are similar to the MSF Auxiliaries?

What is the difference between them?

In my opinion they are very similar because they both are used for Information Gathering

So can anyone can clear out my doubt… Continue reading NSE (nmap script engine) vs. MSF Auxiliaries?→

Posted in Metasploit, nmap

How to identify the encryption

Posted on February 10, 2017 by Utkarsh Agrawal

can any one decode this plzz…

MmI0YjAzN2ZkMWYzMDM3NWU1Y2Q4NzE0NDhiNWI5NWM=

I found this in the source code. As a comment.

Continue reading How to identify the encryption→

Posted in decryption, encryption

How to identify the encryption

Posted on February 10, 2017 by Utkarsh Agrawal

can any one decode this plzz…

MmI0YjAzN2ZkMWYzMDM3NWU1Y2Q4NzE0NDhiNWI5NWM=

I found this in the source code. As a comment.

Continue reading How to identify the encryption→

Posted in decryption, encryption

How to hack the login form? [on hold]

Posted on January 28, 2017 by Utkarsh Agrawal

Suppose i have a login form so i want to ask you that how i confirm that this form getting some flaw rather then SQL injection by apostrophy. I want to know this through step by step.So please can anyone gave me some idea.

i… Continue reading How to hack the login form? [on hold]→

Posted in web-application

What can be in the source code?

Posted on January 21, 2017 by Utkarsh Agrawal

This brings me little bit confusion i.e. In the source code is there any uname and password is hidden if so then how do we know it. And also what information can be hide in it.

Continue reading What can be in the source code?→

Posted in web-application

"exploit complete but session has not been made"

Posted on January 16, 2017 by Utkarsh Agrawal

My target machine is Windows XP SP3 English support and mine is Kali Linux 2.0 on VirtualBox. I try the MS08_067 exploit. Everything is going good, but at the end, I get this warning message:

exploit complete but session has… Continue reading "exploit complete but session has not been made"→

Posted in Exploit, Metasploit

Post navigation

Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Can the ‘Attention Liberation Movement’ Foment a Rebellion Against Screens? April 19, 2026
  • DIY UPS Keeps Home Assistant Running April 19, 2026
  • Why I’m recommending last year’s phones over 2026 models – with one exception April 19, 2026
  • This powerful Gemini setting made my AI results way more personal and accurate April 19, 2026
  • Can Claude Write Z80 Assembly Code? April 19, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up