Hi Friends,
From Last few week, I have been hunting SQL injection in VDP , BBP on Hackerone, but I think, I am lacking some tricks .
I want to ask you guys how you guys do recon and mainly on what criteria do you guys filter the requests from recon results for testing for SQL injections.
Also i have heard there are hidden parameters in requests which might get skipped while doing recon. what is general approach to find those hidden parameters in requests?
i have heard fuzzing is was to find those hidden parameter but as i am starting i dont have good wordlist or please share if there is any better method?
Please share
From Last few week, I have been hunting SQL injection in VDP , BBP on Hackerone, but I think, I am lacking some tricks .
I want to ask you guys how you guys do recon and mainly on what criteria do you guys filter the requests from recon results for testing for SQL injections.
Also i have heard there are hidden parameters in requests which might get skipped while doing recon. what is general approach to find those hidden parameters in requests?
i have heard fuzzing is was to find those hidden parameter but as i am starting i dont have good wordlist or please share if there is any better method?
Please share
Последнее редактирование: