Hacking Tools
MySQL Injection Cheat Sheet
Selasa, 21 Juni 2011
MySQL Injection Cheat Sheet
Basics.
SELECT * FROM login /* foobar */SELECT * FROM login WHERE id = 1 or 1=1SELECT * FROM login WHERE id = 1 or 1=1 AND user LIKE "%root%"Variations.
SELECT * FROM login WHE/**/RE id = 1 o/**/r 1=1SELECT * FROM login WHE/**/RE id = 1 o/**/r 1=1 A/**/ND user L/**/IKE "%root%"
SHOW TABLESSELECT * FROM login WHERE id = 1 or 1=1; SHOW TABLESSELECT VERSIONSELECT * FROM login WHERE id = 1 or 1=1; SELECT VERSION()SELECT host,user,db from mysql.dbSELECT...
Web design and development tools
Rabu, 1 Juni 2011
Web design and development involves a lot for work. From the initial stages of coming up with an idea for how a site should look to actually making it happen, a website can take months or longer before it actually exists. Luckily, there are a lot of tools to help speed up and simplify the process.
Graphics Design Tools
Graphics design tools are used to map out the layout of various pages on a website, as well as for smaller more subtle elements, such as the favicon, that smal...
Menyaring akses website dengan Linksys
Senin, 30 Mei 2011
Linksys router termasuk fitur akses pembatasan yang memungkinkan Anda untuk menyaring dan memblokir akses ke alamat website tertentu, atau URL. Fitur ini mencegah semua orang yang terhubung dengan perangkat Linksys di jaringan lokal mengakses situs tertentu. Anda akan membuat sebuah password untuk kontrol perangkat Linksys sebagai bagian dari proses ini, Anda akan memerlukannya untuk mengubah pengaturan kontrol di atasnya di waktu yang lain. Anda juga dapat menggunakan halama...
SQL Injection for Web site defacement
Minggu, 22 Mei 2011
Web site defacement traditionally occurred when a hacker obtained administrative privileges to a Web site and then altered the content of the Web site with potentially offensive or erroneous graphics and text. While Web site owners have bolstered the security of Web configuration tools, malicious users have discovered a new technique to deface Web sites: SQL injection.
In 2007, there were several high profile incidents in which SQL injection was used for Web site defacement. ...
SQL Injection for DoS
Minggu, 22 Mei 2011
Another
application threat related to SQL injection is Denial of Service (DoS),
which, in its most extreme form, can bring the Web application to a
halt by shutting down its backend database. It takes place when an
attacker appends the SHUTDOWN command to a SQL statement, or when the
attacker creates complex queries over self-joins of large database
tables with the intention of sending the database into time consuming
loops over lots of data. This ends up consuming pre...