SQL InjectionHi, this thread covers all your basic SQL Injection needs. After reading this, you should be able to successfully retrieve Database information such as the username and password that are crucial for defacing sites.Lets start.What is SQL Injection?is a code injection technique that exploits a security vulnerability occurring in the database layer of an application (like queries). The vulnerability is present when user input is either incorrectly filtered for string literal escape characters ...
How to infect a website with .htaccess
Make a file called .htaccess and paste the following code in the file !
Tini Trojan (3 Kb)
Tini is a simple and very small (3kb) backdoor for Windows, coded in assembler.
Hoic 2.1
Hoic Is a Powerful DoD Tool, It Can be a DDoS Tool If You Attack Together
backdoor.pl
Back Connect
Wednesday, February 1, 2012
MySQL Injection[FULL TUTORIAL]
MySQL Injectioin TutorialStructure:
1.Intro#2.What is SQL3.MySQL4.How to find vulnerability5.Exploiting Mysql vulnerability6.Getting Mysql Version7.Getting Mysql User8.Getting Mysql Databases9.Getting Mysql Tables10.Getting Mysql Columns11.Getting Information From Columns12.Finding Admin Panel13.Tools14.Greetz15.End#
1. Intro#today am going to explain MySQL Injection on Live Example.What that means?-Well it means that i'll exploit an real site.This tutorial is for anykind level reader,student,newbie ...
SQL Injection On Vbulletin 4 [Group Exploit]
SQL Injection On Vbulletin 4 [Group Exploit]
Hey fellas,Its been long time since i have posted a new tutorial . BUt like always , here is yet another quality tutorialSo most of us refer vbulletin as invulnerable . But , nothing is unvulnerable > So here is how to do it .1.First get , Mozilla Firefox 3.6.172.Download the Live HTTP Headers addon for Mozilla Firefox.3.Go to google and search this :
Quote:insite: Powered by vBulletin™ Version 4.1.2
4.Find a website that has ...
Make search engine with your name or whatever you want!!
im going to show u web page that you can change your search engine with your name or whatever you want.
and also it can ...
HOW TO HACK UNHACKABLE SITE
Introduction
Sometimes site that is your TARGET just isn't hackable. Even Acunetix Web Security Scanner can't find useful ...
--< Ultimate MySQL Injection Tutorial For Beginners >--
--< Ultimate MySQL Injection Tutorial For Beginners >--
Contents1A: Understanding SQL Injection1B: Tricks & Tools1C: Requirements------2A: Searching for Targets2B: Testing Targets for Vulnerabilities2C: Finding Columns2D: Finding Vulnerable Columns------3A: Obtaining the SQL version3B: Version 4- 1. Obtaining Tables & Columns- 2. Commands3C: Version 5- 1. Obtaining Table Names- 2. Obtaining Column Names from Tables ------------------------------------------------------------------------1A: ...
Subscribe to:
Posts (Atom)