==> The first phase opened in brouser you google hacking
==>I demonstrated above information is needed in the search with google hacking, searching for all the information and store it in your records
==>after getting information that in a sense is enough then do the next stage filtration stage informasi.lalu enter the terminal and typing your target ling terminal
==above I use sql sql injection by typing the command map>
==>next mode wpscan my sample wpscan --url tniad.mil.id
next you loking data base from target
for example loking owasp 10
next sterp in direktori owasp 10
next step you open the password and the jhon aplication
Tidak ada komentar:
Posting Komentar