Header Ads

  • Breaking News

    Join the spark hacking Tools Discord Server! Check out the spark hacking Tools community on Discord - hang out with 1 other members and enjoy free voice and text chat.https://discord.gg/eTsYZp

    How to hack a Website or websites database

    How to hack a Website or websites database

     Hello friends , welcome back to hacking class, today i will explain all the methods that are being used to hack a website or websites database. This is the first part of the class “How to hack a website or Websites database” and in this i will introduce all website hacking methods. Today I will give you the overview and in later classes we will discuss them one by one with practical examples. So guys get ready for first part of Hacking websites class…. Don’t worry i will also tell you how to protect your websites from these attacks and other methods like hardening of SQL and hardening of web servers and key knowledge about CHMOD rights that what thing should be give what rights…

    Note : This post is only for Educational Purpose only.



    What are basic things you should know before website hacking?
    First of all everything is optional as i will start from very scratch. But you need atleast basic knowledge of following things..
    1. Basics of HTML, SQL, PHP.
    2. Basic knowledge of Javascript.
    3. Basic knowledge of servers that how servers work.
    4. And most important expertize in removing traces otherwise u have to suffer consequences.
    Now First two things you can learn from a very famous website for basics of Website design with basics of HTML,SQL,PHP and javascript.

    And for the fourth point that you should be expert in removing traces . For this you can refer to first 5 hacking classes and specially read these two…
    1. Hiding Yourself from being traced.
    2. Removing your Traces 

    As we know traces are very important. Please don’t ignore them otherwise you can be in big trouble for simply doing nothing. so please take care of this step. 

    METHODS OF HACKING WEBSITE:

    1. SQL INJECTION
    2. CROSS SITE SCRIPTING
    3. REMOTE FILE INCLUSION
    4. LOCAL FILE INCLUSION
    5. DDOS ATTACK 
    6. EXPLOITING VULNERABILITY.

    1. SQL INJECTION
     First of all what is SQL injection? SQL injection is a type of security exploit or loophole in which a attacker “injects” SQL code through a web form or manipulate the URL’s based on SQL parameters.  It exploits web applications that use client supplied SQL queries.
    The primary form of SQL injection consists of direct insertion of code into user-input variables that are concatenated with SQL commands and executed. A less direct attack injects malicious code into strings that are destined for storage in a table or as metadata. When the stored strings are subsequently concatenated into a dynamic SQL command, the malicious code is executed.
    For more basic knowledge about SQL injection visit: 

    The above tutorial consists of both types of SQL injection i.e. Manual and automatic through softwares. I will explain SQL injection in more detail with practical example in Next class.


    2. CROSS SITE SCRIPTING
      Cross site scripting (XSS) occurs when a user inputs malicious data into a website, which causes the application to do something it wasn’t intended to do.  XSS attacks are very popular and some of the biggest websites have been affected by them including the FBI, CNN, Ebay, Apple, Microsft, and AOL. 
    Some website features commonly vulnerable to XSS attacks are:
    •  Search Engines
    •  Login Forms
    •  Comment Fields 
    Cross-site scripting holes are web application vulnerabilities that allow attackers to bypass client-side security mechanisms normally imposed on web content by modern browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user. Cross-site scripting attacks are therefore a special case of code injection.
     I will explain this in detail in later hacking classes. So keep reading..
    3. REMOTE FILE INCLUSION
    Remote file inclusion is the most often found vulnerability on the website.
    Remote File Inclusion (RFI) occurs when a remote file, usually a shell (a graphical interface for browsing remote files and running your own code on a server), is included into a website which allows the hacker to execute server side commands as the current logged on user, and have access to files on the server. With this power the hacker can continue on to use local
    exploits to escalate his privileges and take over the whole system. 
    RFI can lead to following serious things on website :
    • Code execution on the web server
    • Code execution on the client-side such as Javascript which can lead to other attacks such as cross site scripting (XSS).
    • Denial of Service (DoS)
    • Data Theft/Manipulation
     4. LOCAL FILE INCLUSION
      Local File Inclusion (LFI) is when you have the ability to browse through the server by means of directory transversal. One of the most common uses of LFI is to discover the /etc/passwd file. This file contains the user information of a Linux system. Hackers find sites vulnerable to LFI the same way I discussed for RFI’s.
    Let’s say a hacker found a vulnerable site, www.target-site.com/index.php?p=about, by means of directory transversal he would try to browse to the /etc/passwd file: 
       www.target-site.com/index.php?p= ../../../../../../../etc/passwd
    I will explain it in detail with practical websites example in latter sequential classes on Website Hacking.
    5. DDOS ATTACK
    Simply called distributed denial of service attack. A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. In DDOS attack we consumes the bandwidth and resources of any website and make it unavailable to its legitimate users.
     For more detailed hack on DDOS visit:
    6.EXPLOTING VULNERABILITY
    Its not a new category it comprises of above five categories but i mentioned it separately because there are several exploits which cannot be covered in the above five categories. So i will explain them individually with examples. The basic idea behind this is that find the vulnerability in the website and exploit it to get the admin or moderator privileges so that you can manipulate the things easily.
    I hope you all now have a overview of that what is Website Hacking. In consecutive future  classes i will explain all of these techniques in details. So guys keep reading..
    IF YOU HAVE ANY QUERIES ASK IN COMMENTS…
    Hello Friends I am back again with my new Hacking article ” How to stop virus or Trojan attacks” from infecting your system. After previous three hacking classes about “Introduction to virus, Trojan, backdoor” and “Different types of Viruses” most of the users asked How to prevent our systems from infecting from viruses. There are several ways to protect your system from being infected. I will try to share almost all tricks. And the most important thing is that after reading this article your system will be 100% secured from all types of Virus attacks but Trojan attacks can happen because of your negligence but i will try to tell all things so that this can also  does not happen. So Guys read on and stop wasting time in removing viruses or Trojans from your computer because from now a single virus cannot enter into your system Its my Guarantee and challenge to all hackers.



    If you want to know that your system is either infected by viruses and trojans then these are certain techniques to know that:
    1. Your Computer might be running slow usual than normal.
    2. Some programs might open without your permission.
    3. System start up takes too much time to start.
    4. Various Error messages appear on Screen when you open something or without opening also.
    5. System registry has been disabled or folder options is missing.
    6. The most important antivirus shows messages of detecting viruses time to time.
    7. While scanning your system from any antivirus or anti spyware tool its showing viruses and you noticed that viruses are not deleting.
    and much more…

    Have you ever think about the reason why your system is got infected. What has infected your system and if its done by any of your friend How he has done it. Surely No, or in some cases you have tried to find the answer but you are not able to get proper answer. But story is different here , I will tell all the ways How your system can be Get infected and How you can protect it if its already infected How you can resolve the problem. So here are few things How your System got Infected , some might be knowing this but by some reason they have ignored them.

    How a System is got Infected because to Negligence?

    1. Using Cracked Versions of software specially security ones like antivirus, anti-spyware etc. 
    Why I have said this is the first and major cause of infection because of the following simple reason that All hackers know that general internet user public always searches for cracked versions of software’s and wishes to use them for free and Hacker take benefit of them. You all now be thinking how it help hackers. We know that almost all antivirus show each and every keygen as virus or some trojan depending upon its type. Now if we all know that then how come hackers will forget this fact so what they do they attaches trojans and viruses to these files and at the time When your antivirus shows it as virus you ignores the alert and keep the keygen means trojan running.
    NOTE: And Guys an important note for you all, If your antivirus doesn’t show any keygen or crack as a virus then don’t ever think that its not a virus but its a most dangerous thing. Why dangerous because now Hacker has used some more brain to fool you that is he has made the virus undetectable simply edit the hex code of original virus. So what is the moral of story Please don’t use cracked versions.
    Now you all be thinking that if we don’t use the cracked versions then how we will able to get full versions of the software’s. Don’t worry when I am there no fear drink beer and enjoy everything for free. Its solution will be in solutions step just read article.

    2. Pen drive or USB drive :
    The biggest cause of infection of your system is usb drives and external hard disks.
    Now how a virus enters into your system using USB drives. You have connected your USB drive to your friends computer and by chance (sorry its for sure i.e 100%) your friends system is infected by virus or Trojans and its the property of Virus that it replicates itself using memory. So when you connect your USB to your friends computer your USB is now infected by virus and now when you connect this USB to your PC using the property of your Windows that it searches the files in Newly connected device and autorun the device and for doing this it loads the index of your USB’s file system into Memory and now if USB has virus its the property  of virus its replicates itself using system memory. Now if you are using good antivirus , your antivirus will pop warning and alert messages and some times you ignores them means your system is also infected. For USB drive virus solution keep reading article.

    3. Downloading things from Unknown Sites:
    Most of the users searches for thing over the internet and where ever they find their desired result means file that they want they start downloading that from that site only. Now how it affects your system suppose you want to download any wallpaper say Katrina Kaif. Now hackers know the fact that Katrina has a huge fan following and user will surely going to download it. Then what they do they simply bind their malicious codes with some of files and when users download it his system is infected and he can never imagine that the virus has come from wallpaper that he has downloaded from unknown site. For its solution read on article.

    4. The most important one Becoming a Hacker like Me (ROFL but its truth).
    Why I have mentioned this you might be clear from the above discussion. Most of the internet users always curious to know ways how can i hack my friends email account or his system for these they download all type of shit from the internet and believe me 99.9% of this shit contains viruses and Trojans that sends your information to the providers. Now I don’t say that stop hacking but try to follow some basic steps to learn hacking and first of all you must know how to protect yourself from such type of fake software’s. For its solution read on article.


    Now after discussing the things How you system is got infected by your simple negligence. Its time You should Know How to fix them and protect your system from all types of viruses and trojans.

    HOW TO STOP VIRUS OR TROJANS ??
    1. Using Good Antivirus:
    There is a nice misconception between the internet users that full antivirus provides better security. Ya its 100% truth but full antiviruses paid ones not the cracked ones.
    There are several other solutions to them that you will get for absolutely Free and I guarantee that it will protect your system 100% just doing some little configurations.

    Best Free Antivirus : Avira Personal Antivirus i.e Antivir.
    You can download avira for free from :
    http://www.filehippo.com/download_antivir/

    Now after downloading the antivirus what you have to do to make it as good as paid antiviruses.
    a. Install the antivirus and update it. Note updating antivirus regularly is compulsory. Don’t worry its not your work it will update itself automatically whenever update is available.
    b. After Installing at the right hand top corner you will see a “CONFIGURATION” button. Just click on it now a new window will pop up.
    c. Now There at left hand top you will see a click box in front of Expert is written . Click on that now you will see several things in it. Now do the following setting one by one.
    1. Click on “Scanner” click on all files and set the “Scanner Priority” to high and click on apply.
    2. Click on “Guard” and click on all files and click on “Scan while reading and writing” and then click apply.
    3. Click on “General” Now click on select all and click on apply. In general tab only go to WMI section and click on advanced process protection and then click on apply.
    4. After doing that restart your PC.
    Now you have made your free antivirus an equivalent to the paid one..


    Best Free Anti-Spyware: Spyware Terminator with crawler Web security toolbar.
    Download It for free :
    http://www.filehippo.com/download_spyware_terminator/

    Install spyware terminator with web security tool bar . Now your following problems are being solved:
    1. No Trojan can attack you.
    2. Protection from Malicious websites and much more..


    2. Solution for Cracked version Software’s:
    As I have mentioned earlier never download cracks and keygens directly to you system but several other methods are there while you are searching for Crack or Keygen first try to search for Serial Key if you found it then its awesome and if not what to do.
    Before downloading any Crack and Keygen . Go to the Website:
    ;

    Now copy the download link of the Keygen or crack in the URL box provided on website this website contains all the world famous antiviruses and it will scan file for you if it contains any virus just ignore that otherwise have fun with crack or Keygen.

    3. Pen drive or USB drive solution:
    How you can protect your system from being infected from the pen drive. Just do the following three things rest is being cared by your antivirus.
    1. Turn off Auto Play Devices:
    To do it Go to Start Menu–> RUN–>type gpedit.msc and press enter–>User Configuration–>Administrative templates–>System–>Turn off Autoplay–> click on enable and then select all drives.
    2. Turn of Computer Browser service:
    To do it Go to Start Menu–> RUN–>type services.msc and press enter–>then Find Computer Browser service and disable it and restart your system.
    3. Most important one Always scan the Pen drive or External hard drives after connecting them.

    4.Downloading things from Unknown Sites Solution:
    The solution of this problem is already provided Web browser Security toolbar will help you in surfing only secured and genuine websites and if you want to visit and download Virus Total will help you to identify the file whether its infected or not.

    5. Now for Hacker like me i.e Method to use or test Hack tools.
    Why I have mentioned this is simply because Hackers always take benefit of these noobish tricks that they attach viruses with files and name them as hack tools . So avoid them if you are too curious like me. Then there are several ways to Handle it.
    1. Use Deep Freeze on C drive: For testing Hack tools always use deep freeze as after the next restart your system will be at same position as it was previous.
    2. Install Virtual Box and over virtual box install another Windows and test all hack tools using virtual windows. This will protect your system from being infected. Also It will give you more knowledge about handling the viruses and other situations like when something wrong is done what i have to do.
    3. Create two to three fake email ID’s and use them for testing Keyloggers and other fake email hacking software’s.

    For Some more security Tips you can also read my previous article:


    I hope You all have liked this Article if you have any queries ask in form of comments and all suggestions are heartily Welcomed.
    Hey Guys Welcome back In my previous tutorial I have just named the different types of viruses. Today we are going to have a deeper look of these different types like where they store, what they damage,and how to get rid from them?? So Guys read on…

    Hacking Class 17 - Different Types of Virus and Worms


    System Sector Viruses 
    System sectors are special areas on your disk containing programs that are executed when you boot (start) your PC. System sectors (Master Boot Record and DOS Boot Record) are often targets for viruses. These boot viruses use all of the common viral techniques to infect and hide themselves. They rely on infected floppy disk left in the drive when the computer starts, they can also be “dropped” by some file infectors or Trojans.


    Stealth Virus

    These viruses evade anti-virus software by intercepting its requests to the operating system.
    A virus can hide itself by intercepting the anti-virus software’s request to read the file and passing the request to the virus, instead of the OS. The virus can then return an uninfected version of the file to the anti-virus software, so that it appears as if the file is “clean”.
    Bootable CD-ROM Virus
    These are a new type of virus that destroys the hard disk data content when booted with the infected CD-ROM.
    Example: Someone might give you a LINUX BOOTABLE CD-ROM.
    When you boot the computer using the CD-ROM, all your data is gone. No Anti-virus can stop this because AV software or the OS is not even loaded when you boot from a CD-ROM.
    Self-Modification Virus
    Most modern antivirus programs try to find virus-patterns inside ordinary programs by scanning them for virus signatures.
    A signature is a characteristic byte-pattern that is part of a certain virus or family of viruses.
    Self-modification viruses employ techniques that make detection by means of signatures difficult or impossible. These viruses modify their code on each infection. (each infected file
    contains a different variant of the virus)
    Polymorphic Code Virus
    A well-written polymorphic virus therefore has no parts that stay the same on each infection.To enable polymorphic code, the virus has to have a polymorphic engine (also called mutating engine or mutation engine). Polymorphic code is a code that mutates while keeping the original algorithm intact.
    Metamorphic Virus
    Metamorphic viruses rewrite themselves completely each time they are to infect new executables. Metamorphic code is a code that can reprogram itself by translating its own code into a temporary representation, and then back to normal code again.
    For example, W32/Simile consisted of over 14000 lines of assembly code, 90% of it is part of the metamorphic engine.
    File Extension Virus
    File extension viruses change the extensions of files. .TXT is safe as it indicates a pure text file. With extensions turned off if someone sends you a file named BAD.TXT.VBS you will only see BAD.TXT.If you’ve forgotten that extensions are actually turned off, you might think this is a text file and open it. This is really an executable Visual Basic Script virus file and could do
    serious damage .
    Countermeasure is to turn off “Hide file extensions” in Windows.
    Hacking Class 17 - Different Types of Virus and Worms

    These are for Today .. Tomorrow we will Discuss HOW TO MAKE VIRUSES and HOW TO DO VIRUS CODING without knowing much about coding and programming language…So guys keep Reading…
    IF YOU HAVE ANY QUERIES ASK ???
    Ok so you want to test the security of your site against DDoS’s.
    TOOLS REQUIRED :

    >>Port Scanner<<
    >>rDos<<
    (click on them to Download)


    Step One: First we need to find the websites IP Adress. This is very easy todo.
    Ok so say they URL is  ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping  press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /’s).

    EXAMPLE:






    Step Two: Now we must test to see if port 80 is open (it usually is).
    This is very easy todo to Ok open up the port scanner you downloaded.
    Once in the port scanner type in your Victims ip that you got from step 1.
    It will ask you to do a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y.

    [X] = Closed
    [X] Vulnerable = Open


    EXAMPLE:






    Step Three:
    The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)
    If port 80 is open your on your way to crashing!!
    Ok open Up rDos that you download.
    Enter the ip that we got from step 1.
    It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work.
    Hit enter.. *=Flooding -=Crashed Or didn’t connect!

    EXAMPLE:






    The site won’t be directly offline!!
    it starts with ***********
    be patiend.. after some time it will go like this: **********———–
    that means the site crashed.
    Thanks for reading i hope this helps. IF you have Any Queries Ask Them.

    No comments

    Post Top Ad

    Post Bottom Ad