Hey guys, today I’m going to talk about few quick tips on hacking. Remember, these tips are especially for black hat hackers. We don’t encourage getting into unethical things. This is just informative article on the rules that hacker culture follow. So, here we go!
Hello guys! I have been working on PostgreSQL database and attempting to attack it since a few days.
The reason for this is, I want to get access to my college database and gain some juicy information.
So what I did firstly is I scanned the entire network for open ports using nmap. Since I’m using
Kali Linux, it is directly available from the terminal by typing nmap. You can scan a server and
get a list of open ports and the services running at it just by typing, nmap -sV [ip_address].
The above command scans the entire 1024 trusted ports in the victim’s computer and gives a list of open
ports, services running at the ports. The programs that run at a particular port are known as daemons. Continue reading →
Hey guys, today I thought to talk about a vulnerability which is found on MySQL and MariaDB databases. I have surfed and went through a lot of written stuff to get a proper understanding about this vulnerability. Actually I was completely unaware of this stuff! I came knew about this when I just scanned my college’s Online Information System (OIS) and I got an alert saying “MySQL/MariaDB sql/password.c is vulnerable”. When I researched over this topic, I have come up with a notion to hack into my college’s information systems. Well, I will let you guys know once I successfully perform that, but right now I’m on a vacation so I’ll give a try when I move back. Continue reading →
Hey guys! I have taken such a long time delivering you with some information, so today I thought to teach you some interesting stuff. There are over 30 million of sites available on internet and 16% of them are highly vulnerable to SQL injection attack. In this article I will teach you what exactly is SQL injection, how it works and how to perform. I have already taught you some basics in my last article. I advice you to take a look at my previous article before you continue reading this.
Today we are gonna access the database of a European site http://www.adas-fusion.eu/
Recently I have found a link vulnerable to SQL injection.
Read on…. Continue reading →
Hey guys, let’s have a break from Windows Security topic, so today I came up with Web security. That is, I am going to discuss about hacking a website using SQL injection. Here we are going to exploit the filtration vulnerability with the help of the escape characters. Although there are the other type of SQL injection attacks I will discuss them individually and very briefly in my upcoming articles.
Shubro has already discussed two articles on this topic and have given an overview of this vulnerability with working concept. But today I am going to explain the same with an example. Yes!! I am gonna hack a site and bypass the admin panel of the website. You will see me getting through the admin panel bypassing the login prompt!
This trick is quite old and still we find several sites having this vulnerability. Out of every 10 websites 4 are vulnerable to this attack, and these are very easily available through the search engines like Google, Yahoo and Bing! This SQL vulnerability is mostly found on asp governed sites. Continue reading →
This is my first post in this blog as I have been honoured by the admin of this blog as the author to add materials for the interested viewers.
Anyways… Before I start anything I would make sure that all the viewers are comfortable and enjoying the posts 🙂
Okay now lets begin with the topic I have mentioned above.
What is the first thing that comes to your mind when you see a topic like Website Hijacking ?? Do you feel like today after reading this you gonna hijack somebody’s website and bring the hell out of him? Continue reading →