Site
How to upload backdoor into the target site
Selasa, 19 Juli 2011
There may be constraints well after the takeover sqli bugs via the web, we just dapet access to the admin panel, be content if there fitus cmsnya upload pictures, hehehe: D barriers are just upload pictures, upload php? t
If the target CMS Joomla
you can change the file can be uploaded in the media in the settings in Global Configuration tab in the system plus the php extension and then save. After that upload your shell in media management. your shell will be ...
SQL Injection for Web site defacement
Minggu, 22 Mei 2011
Web site defacement traditionally occurred when a hacker obtained administrative privileges to a Web site and then altered the content of the Web site with potentially offensive or erroneous graphics and text. While Web site owners have bolstered the security of Web configuration tools, malicious users have discovered a new technique to deface Web sites: SQL injection.
In 2007, there were several high profile incidents in which SQL injection was used for Web site defacement. ...
How to set up an e-commerce site using PayPal to process
Jum`at, 20 Mei 2011
Selling stuff online has become the new "side business" of many
Internet users, whether it's used clothes, vintage computer items,
custom-made gadgets, or homemade cookies. There are numerous venues to
do this without having to expend any brainpower (eBay still being the
go-to source) but there are downsides to using those services—namely,
there are so many people using them to sell items of questionable quality that it's easy to get dismissed as "yet another eBay ...
Step by Step to Deface Site with SQL Injection
Senin, 18 April 2011
What is SQL injection ?
SQL stands for Structured Query Language. It is very high level language,I mean close to humans. Like SELECT,INSERT,DELETE,UPDATE queries are used to select,add data,delete data,update data respectively.SQL is used to design the databses. The information is stored in databses. SQL injection is the vulnerability occuring in database layer of application which allow attacker to see the contents stored in database. This vulnerabilty occures when the use...
Ancaman Serangan Directory Traversal Attacks di Web Server
Senin, 1 November 2010
Ancaman Serangan traversal DirektoriSalah satu fungsi penting dari Web server yang aman adalah mengendalikan akses pada direktori yang terlarang. Mengeksploitasi HTTP untuk menghindari serangan keamanan Web server dan menggunakan perangkat lunak berbahaya untuk mengakses isi direktori yang dibatasi/disembunyikan. Directory traversal adalah salah satu teknik untuk mengeksploitasi HTTP.
Tujuan dari serangan Traversal Direktori adalah untuk menjalankan perintah yang akan mengaks...