background preloader

Hacking hackers

Facebook Twitter

Google Releases Free Web Security Scanner - Security - Application Security. Hacker Test: A site to test and learn about web hacking. The History of Hacking. Eve and the Identity of Women: 7. Eve & Lilith. In an effort to explain inconsistencies in the Old Testament, there developed in Jewish literature a complex interpretive system called the midrash which attempts to reconcile biblical contradictions and bring new meaning to the scriptural text. Employing both a philological method and often an ingenious imagination, midrashic writings, which reached their height in the 2nd century CE, influenced later Christian interpretations of the Bible. Inconsistencies in the story of Genesis, especially the two separate accounts of creation, received particular attention. Later, beginning in the 13th century CE, such questions were also taken up in Jewish mystical literature known as the Kabbalah. According to midrashic literature, Adam's first wife was not Eve but a woman named Lilith, who was created in the first Genesis account.

Only when Lilith rebelled and abandoned Adam did God create Eve, in the second account, as a replacement. Lilith also personified licentiousness and lust. Lilith? Top Sites To Find All The Serials You Need |Hack Tricks. MSSQL Injection Cheat Sheet. Some useful syntax reminders for SQL Injection into MSSQL databases… This post is part of a series of SQL Injection Cheat Sheets. In this series, I’ve endevoured to tabulate the data to make it easier to read and to use the same table for for each database backend. This helps to highlight any features which are lacking for each database, and enumeration techniques that don’t apply and also areas that I haven’t got round to researching yet.

The complete list of SQL Injection Cheat Sheets I’m working is: I’m not planning to write one for MS Access, but there’s a great MS Access Cheat Sheet here. Some of the queries in the table below can only be run by an admin. These are marked with “– priv” at the end of the query. Misc Tips In no particular order, here are some suggestions from pentestmonkey readers. From Dan Crowley:A way to extract data via SQLi with a MySQL backend From Jeremy Bae: Tip about sp_helpdb – included in table above. From Trip: List DBAs (included in table above now): How to Unlock a Computer Without a Password Reset Disk. Googlehackers.pdf (application/pdf Object) Complete Hacker's Handbook. The Best Hacking Tutorial Sites - Learn Legal Hacking. Hacker Typer. Mathematical Atlas: A gateway to Mathematics.

» Wireless Hacking Live-CD (FBI version){Must Have} Rapidshare Links | DVDRips - TV-Series - Appz - Games - Movies - Music - MP3.

SQL injection

The Best Hacking Tutorial Sites - Learn Legal Hacking. Hacking and Security Articles / Tutorials / White Papers at HellBound Hackers. Maptor – a Map and a Projector 2 in 1 « Gadget Reviews, Gift Ideas, Latest Cool Gadgets. Phishing with Encoded IP Addresses – Intrepidus Group - Insight. I was adding a little special sauce to Phishme.com this past week and thought this might be fun to share. We have a few different ways a user can craft their phishing links. If he/she chooses the IP address option, then there is also the choice of encoding options. This lets you mask the IP address in an attempt to trick the user into thinking part of the sub directory is perhaps the host name.

Or as in the case with my mom… she thinks it is just the phone number so the computer knows where to call. And it’s hard to blame her when you see a decimal encoded IP address. The team over at Marshal has put together a good walk through of the encoding so you can follow along. -b3nn Both comments and trackbacks are currently closed. SQL Injection Walkthrough. 1.0 Introduction When a machine has only port 80 opened, your most trusted vulnerability scanner cannot return anything useful, and you know that the admin always patch his server, we have to turn to web hacking. SQL injection is one of type of web hacking that require nothing but port 80 and it might just work even if the admin is patch-happy. It attacks on the web application (like ASP, JSP, PHP, CGI, etc) itself rather than on the web server or services running in the OS. This article does not introduce anything new, SQL injection has been widely written and used in the wild. We wrote the article because we would like to document some of our pen-test using SQL injection and hope that it may be of some use to others. 1.1 What is SQL Injection?

1.2 What do you need? 2.0 What you should look for? Everything between the <FORM> and </FORM> have potential parameters that might be useful (exploit wise). 2.1 What if you can't find any page that takes input? Hi' or 1=1-- Writing Buffer Overflow Exploits - a Tutorial for Beginners. 1. Memory Note: The way we describe it here, memory for a process is organized on most computers, however it depends on the type of processor architecture. This example is for x86 and roughly applies to Sparc.

The principle of exploiting a buffer overflow is to overwrite parts of memory that are not supposed to be overwritten by arbitrary input and making the process execute this code. To see how and where an overflow takes place, let us look at how memory is organized. A page is a part of memory that uses its own relative addressing, meaning the kernel allocates initial memory for the process, which it can then access without having to know where the memory is physically located in RAM. The processes memory consists of three sections: - Code segment, data in this segment are assembler instructions that the processor executes. . - Data segment, space for variables and dynamic buffers 2. What happens here?

In this case, our return address is 0x8054327. 3. End of assembler dump. 3a. 3b. 4. 5. Web Application Exploits and Defenses. How Hackers Steal Your Internet & How to Defend Against It. How Hackers Steal Your Internet & How to Defend Against It I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?! ". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless network that easily, this is NOT a good thing. After someone cracks an access point, possibilities are limitless. There's SSL stripping, packet sniffing, MITM (Man-In-The-Middle) attacks, ARP poisoning—not to mention being completely anonymous by using someone else's Wi-Fi. Proof of Concept The theory behind cracking access points is simple.

WPA/2 is a little different. WPA/2 has the fixed a vulnerability that was in WEP and has a required password length of an 8 character minimum. In this Null Byte, I'm going to show you how to break into your own wireless network and assess its security so you can have a impenetrable network! Step 1 Spoofing a MAC Address ifconfig. Top 15 Security/Hacking Tools & Utilities. 1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

Can be used by beginners (-sT) or by pros alike (–packet_trace). Get Nmap Here 2. Recently went closed source, but is still essentially free. Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Get Nessus Here 3. Yes, JTR 1.7 was recently released! You can get JTR Here 4. Get Nikto Here 5. Powerful TCP port scanner, pinger, resolver. Get SuperScan Here 6. p0f 7. 8. Top 15 Security/Hacking Tools and Utilities | Teckh. The hacker's guide to website security. 3. Gaining access The next step is gaining access to the web application, database or the server itself, using a selection of the following attacks: cross-site scripting XSS, SQL injections, command injections, cookie/session poisoning, parameter/form tampering, buffer overflow, authentication hijacking, obfuscation attack, platform exploits, application exploits, brute force attacks and web services exploits.

Step 1: Software exploits Ethical hacker: "As I'm focusing on information leaks and unauthorised access, I'll concentrate on application exploits, SQL injections, form manipulation and XSS. I'll start with the software I know has been installed and check for exploits. ● Vbulletin 3.8.6 exploit – lots of them, XSS, remote execution and SQL injections. ● phpmyadmin 3.2.5 exploit – nothing there but I could try a brute force if all else fails. ● Joomla 1.5 – lots of different exploits available.

Let's have a look at the websites on the server. Step 2: Form manipulation Step 4: XSS.