Holisticz - Embrace the Infinite

Step into the world of endless opportunities and unlock the gateway to virtual transactions.

  • Domain Update: Our Forum has moved! Please visit us at Holisticz.com for the latest updates.

any one can give simple quick explanation of dumping?

Zentred

Member

0

0%

Status

Offline

Posts

12

Likes

6

Rep

6

Bits

0

2

Years of Service

straipie2

Divine
Divine Contributor Royal Reverser

0

0%

Status

Offline

Posts

4,887

Likes

1,244

Rep

679

3

Years of Service

(10 July, 2022 - 09:56 AM)Zentred Wrote: Show More
like i think that a dumper it go through the urls and if the database is there it say its vulenerable? i don't know

just something if anyone can explain simply how it know if the url is vulnerable

sqlmap
[Image: e3oKtX1.png]
[Image: ZEDanVL.png]

[Image: PfSeCcZ.png]
 

Zentred

Member

0

0%

Status

Offline

Posts

12

Likes

6

Rep

6

Bits

0

2

Years of Service

straipie2

Divine
Divine Contributor Royal Reverser

0

0%

Status

Offline

Posts

4,887

Likes

1,244

Rep

679

3

Years of Service

(10 July, 2022 - 10:01 AM)Zentred Wrote: Show More
(10 July, 2022 - 09:57 AM)straipie2 Wrote: Show More
(10 July, 2022 - 09:56 AM)Zentred Wrote: Show More
like i think that a dumper it go through the urls and if the database is there it say its vulenerable? i don't know

just something if anyone can explain simply how it know if the url is vulnerable

sqlmap

i am not wondering how to dump

i am wondering how it know if the link is vulnerable like

[CRACKED] SQLBox - Multi Functional Pentesting Toolhere you go if you wanna do it mannualy tho than wish you luck finding tutorials but its done with SQLi and xss
[Image: e3oKtX1.png]
[Image: ZEDanVL.png]

[Image: PfSeCcZ.png]
 

48,676

38,236

238,827

Top