Posts

Showing posts from 2016
Image
Hello there! Today we'll be learning PHP security. Now, this article is aimed to prevent SQL injection on your website/webapp. Before reading this article, you should have a basic knowledge of PHP, SQL, HTML, a little CSS (for we'll be designing our sample web app a little bit) and XAMPP. If you have no idea what those are, please learn the basics of those first before delving into this tutorial. Alright, without any further ado, let's begin!  What is SQL injection? SQL injection is a kind of attack wherein the attacker "injects" SQL commands into the input field and if the website is vulnerable, the attacker can alter, edit, delete and dump data from the Database. How SQL injection works? A normal user would just go and input a normal value. For example, you have a website that lets users view types of fashion depending on the country. The normal user might enter a country let's say "Philippines", after the user enters that, the database w

Upload Shell And Hack Website Using LFI

Image
Upload Shell And Hack Website Using LFI Hack Website Using LFI, Shell Upload Using LFI, Shell Uploading Using /proc/self/environ, Hack Website With /proc/self/environ, LFI, How To Hack With LFI, Shell Uploading Hallo Friends Today I Shown how To Hack A Website using LFI:-   Please Do Not Deafce This   Target Site:-   http://yesdial.co.in   Step:1  Find The LFI Target Point On This Website:-  Target LFI Point:-http://yesdial.co.in/cindex.php?file=search.php&stype=product&inputstring=Astrologers   Step:2  Now Remove All Text After The (.php?file=)   Now Url looking Like This:-  http://yesdial.co.in/cindex.php?file =   Step:3  Put The Back_slash After The (.php?file=/)   Now Url looking Like This:-http://yesdial.co.in/cindex.php?file=/   If You Got Any Error After Puting The (/) Than Chance To Valurnable To LFI IS 80%   If You Seen Datas Are Hide On Website, Than Chance To Valurnable To LFI IS 50-50%   Here Is Hide Datas On Website After Put (/)  

Guide to find 0day exploits

Image
COMPLETE GUIDE TO FIND 0DAY EXPLOITS Hello my masters and colleagues, first of all I would like to apologize for my absence during the past month, to say that i was busy with some projects and decide to leave the white-side for a while and made some visits on the dark-side(every good COP has a dealer friend),i left null byte last month to learn more and come here to share with you ... I spent almost the whole last month trying to practice my knowledge, and there were moments where the systems were well protected, not that they were impossible to be hacked but hard or complicated, so I decided to start investigating deeply the functioning of these systems to see if I could find flaws instead of simple scans with some tools, I began by analyzing the code of applications in the case of open source , sending abnormal data and more, and in the end most were hacked and still others are in process. btw gr33tz t0 :Ciuffy ghost_ Phoenix750 f0r the gr3at j0b INTRODUCTION According to wiki

Complete Basic Tutorial on DNS Hijacking

Image
Complete Basic Tutorial on DNS Hijacking DNS hijacking (sometimes said as DNS redirection) could be a style of malicious attack that overrides a computer’s TCP/IP settings to purpose it at a scallywag DNS server, thereby unsupportive the default DNS settings. In alternative words, once AN assaulter takes management of a laptop to change its DNS settings, in order that it currently points to a scallywag DNS server, the method is said as DNS hijacking. As we have a tendency to all grasp, the “Domain Name System (DNS)” is especially answerable for translating a user friendly name like “google.com” to its corresponding science address “69.134.227.26”. Having a transparent plan of DNS and its operating will assist you higher perceive what DNS hijacking is all concerning. If you're fairly unaccustomed the thought of DNS, i'd advocate reading my previous post on however name System Works. How DNS Hijacking Works? As mentioned before, DNS is that the one that'

Top 6 Web Vulnerability Scanner Tools

Image
Top 6 Web Vulnerability Scanner Tools Web Vulnerability Scanner Tools: Web site security is very important because the website contain relevant information about a company and now a days website defacement is very common even a script kiddies and a new born hackers can do this. The most common vulnerability like SQL-Injection and cross site scripting lead towards the defacement.  So you want to secure your web application than find vulnerabilities on it before a hacker find it, try to use some relevant tools and find vulnerabilities and fix it. There are so many tools available for both Windows and Linux platform and commercial and open source tool. Below is the best web vulnerability scanner tool that we have discussed before. OWASP Zed Attack Proxy- ZAP OWASP or Open Web Application Security Project is a non profit organisation world wide that are focusing on improving the security of web application, for more about OWASP click  here .  The Zed Attack P