Hacking

Hacking is an ART OF EXPLOITATION.

Thursday, January 27, 2011

Google Dork To find sql

inurlage.php?file=inurl:newsDetail.php?id=inurl:gallery.php?id=inurl:article.php?id=inurl:show.php?id=inurl:staff_id=inurl:newsitem.php?num=inurl:readnews.php?id=inurl:top10.php?cat=inurl:historialeer.php?num=inurl:reagir.php?num=inurltray-Questions-View.php?num=inurl:forum_bds.php?num=inurl:game.php?id=inurl:view_product.php?id=inurl:newsone.php?id=inurl:sw_comment.php?id=inurl:news.php?id=inurl:avd_start.php?avd=inurl:event.php?id=inurlroduct-item.php?id=inurl:sql.php?id=inurl:news_view.php?id=inurl:select_biblio.php?id=inurl:humor.php?id=inurl:aboutbook.php?id=inurl:fiche_spectacle.php?id=inurl:communique_detail.php?id=inurl:sem.php3?id=inurl:kategorie.php4?id=inurl:news.php?id=inurl:index.php?id=inurl:faq2.php?id=inurl:show_an.php?id=inurlreview.php?id=inurl:loadpsb.php?id=inurlpinions.php?id=inurl:spr.php?id=inurlages.php?id=inurl:announce.php?id=inurl:clanek.php4?id=inurlarticipant.php?id=inurl:download.php?id=inurl:main.php?id=inurl:review.php?id=inurl:chappies.php?id=inurl:read.php?id=inurlrod_detail.php?id=inurl:viewphoto.php?id=inurl:article.php?id=inurlerson.php?id=inurlroductinfo.php?id=inurl:showimg.php?id=inurl:view.php?id=inurl:website.php?id=inurl:hosting_info.php?id=inurl:gallery.php?id=inurl:rub.php?idr=inurl:view_faq.php?id=inurl:artikelinfo.php?id=inurl:detail.php?ID=inurl:index.php?=inurlrofile_view.php?id=inurl:category.php?id=inurlublications.php?id=inurl:fellows.php?id=inurl:downloads_info.php?id=inurlrod_info.php?id=inurl:shop.php?do=part&id=inurlroductinfo.php?id=inurl:collectionitem.php?id=inurl:band_info.php?id=inurlroduct.php?id=inurl:releases.php?id=inurl:ray.php?id=inurlroduit.php?id=inurlop.php?id=inurl:shopping.php?id=inurlroductdetail.php?id=inurlost.php?id=inurl:viewshowdetail.php?id=inurl:clubpage.php?id=inurl:memberInfo.php?id=inurl:section.php?id=inurl:theme.php?id=inurlage.php?id=inurl:shredder-categories.php?id=inurl:tradeCategory.php?id=inurlroduct_ranges_view.php?ID=inurl:shop_category.php?id=inurl:tran******.php?id=inurl:channel_id=inurl:item_id=inurl:newsid=inurl:trainers.php?id=inurl:news-full.php?id=inurl:news_display.php?getid=inurl:index2.php?option=inurl:readnews.php?id=inurl:top10.php?cat=inurl:newsone.php?id=inurl:event.php?id=inurlroduct-item.php?id=inurl:sql.php?id=inurl:aboutbook.php?id=inurl:review.php?id=inurl:loadpsb.php?id=inurl:ages.php?id=inurl:material.php?id=inurl:clanek.php4?id=inurl:announce.php?id=inurl:chappies.php?id=inurl:read.php?id=inurl:viewapp.php?id=inurl:viewphoto.php?id=inurl:rub.php?idr=inurl:galeri_info.php?l=inurl:review.php?id=inurl:iniziativa.php?in=inurl:curriculum.php?id=inurl:labels.php?id=inurl:story.php?id=inurl:look.php?ID=inurl:newsone.php?id=inurl:aboutbook.php?id=inurl:material.php?id=inurlpinions.php?id=inurl:announce.php?id=inurl:rub.php?idr=inurl:galeri_info.php?l=inurl:tekst.php?idt=inurl:newscat.php?id=inurl:newsticker_info.php?idn=inurl:rubrika.php?idr=inurl:rubp.php?idr=inurlffer.php?idf=inurl:art.php?idm=inurl:title.php?id=inur...

Man in the browser (MITB) attacks

Man-in-the-Browser (MitB), a form of Internet threat related to Man-in-the-Middle (MitM), is a trojan that infects a web browser and has the ability to modify pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host application. A MitB attack will be successful irrespective of whether security mechanisms such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place. The only way to counter a MitB attack is by utilising transaction verification.The...

Seven layers of OSI

The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layerLet’s take a practical example so that we understand it better.Layer 7 = Application LayerYou open your Internet browser and type in the name of the website of your target which you want to visit.Layer 6 = Presentation LayerYour browser knows how to show pictures from different format, such as JPG, PNG…Your...

How to put your PC clean and Maintain privacy

The software which i used to clean temporary files and make your system privacyi will use the tool called CCLEANERTo download the ccleaner ClickH...

Cloud Computing

Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth.A simple example of cloud computing is Yahoo email or Gmail etc. You dont need a software or a server to use them. All a consumer would need is just an...

LDAP Injection

What is LDAP:LDAP is a protocol that facilitates the location of organizations, individuals and other resources in a network. It is a streamlined version of DAP (Directory Access Protocol), which is part of X.500, a standard for network directory services.The Lightweight Directory Access Protocol (LDAP) provides a mechanism for connecting to, searching, and modifying internet directories. LDAP statements (or Queries) used to retrieve data from information directories.What is LDAP Injection:LDAP injection is a specific form of attack that can...

Understanding Denial-of-Service Attacks

What is a denial-of-service (DoS) attack?In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information....

Online tools for hacking

PICTURE To ASCII Convert - http://picascii.comWhois - IP Address - Domain Name Lookup - http://cqcounter.com/whois/AdHoc IP Tools http://tatumweb.com/iptools.htmBen's Web Utilities http://www.phaster.com/find_info_net_traffic.htmlcentral OPS http://centralops.net/co/dihe's IP Index http://ipindex.homelinux.net/index.php?Domain Tools http://www.domaintools.com/Global Whois Search http://www.ratite.com/whois/whois.htmlMulti DNS Lookup (Bankes.com) http://www.bankes.com/nslookup.htmNetwork Solutions http://www.networksolutions.com/whois/index.jspPublic...

Tools used in Application Security & Penetration Testing

In this article I’ll tell you, what tools are typically used in Application Security (in short AppSec) & Penetration Testing (in short PenTest).1. Foot-printing Tools : SamSpade, NSlookup, dig, whois, Netcraft, ike-scan, ping, tracert / traceroute, HTTPrint,P0f etc.2. Port Scanning Tools : Nmap, Super Scan.3. Packet Crafting Tools : Hping 2.4. Web Application Scanning Tools : Acunetix, HP WebInspect, AppScan, Nikto,wikto, NStaker,Core-impact.5. Application/Network Vulnerability Scanning Tools : Retina, Nessus, Core-impact, ike-probe, GFI-Languard,...

Motivational Lines

Koshish Karne Walon Ki Her Nahin HotiLahron Se Dar Kar Nauka Par Nahin HotiKoshish Karne Walon Ki Her Nahin HotiNanhi Chiti Jab Dana Lekar Chalti HaiChadhti Deewaron Par Sau Bar Phislati HainMan Ka Viswas Ragon Mein Sahas Bharta HainChadhkar Girna Girkar Chadhna Na Akharta HainAkhir Uski Mehnat Bekar Nahin HotiKoshis Karne Walon Ki Her Nahin HotiDubkiyan Sindhu Mein Gotakhor Lagata HainJa Jakar Khali Haath Laut Aata HainMilte Nahin Sahaj Hi Moti Gahre Pani MeinBadhta Duna Utsah Isi Hairani MeinMuthi Uski Khali Her Bar Nahi HotiKoshis Karne Walon...