Pages

Banner 468 x 60px

 

Thursday, January 27

Google Dork To find sql

1 comments
inurlage.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:article.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= inurl:readnews.php?id= inurl:top10.php?cat= inurl:historialeer.php?num= inurl:reagir.php?num= inurltray-Questions-View.php?num= inurl:forum_bds.php?num= inurl:game.php?id= inurl:view_product.php?id= inurl:newsone.php?id= inurl:sw_comment.php?id= inurl:news.php?id= inurl:avd_start.php?avd= inurl:event.php?id= inurlroduct-item.php?id= inurl:sql.php?id= inurl:news_view.php?id= inurl:select_biblio.php?id= inurl:humor.php?id= inurl:aboutbook.php?id= inurl:fiche_spectacle.php?id= inurl:communique_detail.php?id= inurl:sem.php3?id= inurl:kategorie.php4?id= inurl:news.php?id= inurl:index.php?id= inurl:faq2.php?id= inurl:show_an.php?id= inurlreview.php?id= inurl:loadpsb.php?id= inurlpinions.php?id= inurl:spr.php?id= inurlages.php?id= inurl:announce.php?id= inurl:clanek.php4?id= inurlarticipant.php?id= inurl:download.php?id= inurl:main.php?id= inurl:review.php?id= inurl:chappies.php?id= inurl:read.php?id= inurlrod_detail.php?id= inurl:viewphoto.php?id= inurl:article.php?id= inurlerson.php?id= inurlroductinfo.php?id= inurl:showimg.php?id= inurl:view.php?id= inurl:website.php?id= inurl:hosting_info.php?id= inurl:gallery.php?id= inurl:rub.php?idr= inurl:view_faq.php?id= inurl:artikelinfo.php?id= inurl:detail.php?ID= inurl:index.php?= inurlrofile_view.php?id= inurl:category.php?id= inurlublications.php?id= inurl:fellows.php?id= inurl:downloads_info.php?id= inurlrod_info.php?id= inurl:shop.php?do=part&id= inurlroductinfo.php?id= inurl:collectionitem.php?id= inurl:band_info.php?id= inurlroduct.php?id= inurl:releases.php?id= inurl:ray.php?id= inurlroduit.php?id= inurlop.php?id= inurl:shopping.php?id= inurlroductdetail.php?id= inurlost.php?id= inurl:viewshowdetail.php?id= inurl:clubpage.php?id= inurl:memberInfo.php?id= inurl:section.php?id= inurl:theme.php?id= inurlage.php?id= inurl:shredder-categories.php?id= inurl:tradeCategory.php?id= inurlroduct_ranges_view.php?ID= inurl:shop_category.php?id= inurl:tran******.php?id= inurl:channel_id= inurl:item_id= inurl:newsid= inurl:trainers.php?id= inurl:news-full.php?id= inurl:news_display.php?getid= inurl:index2.php?option= inurl:readnews.php?id= inurl:top10.php?cat= inurl:newsone.php?id= inurl:event.php?id= inurlroduct-item.php?id= inurl:sql.php?id= inurl:aboutbook.php?id= inurl:review.php?id= inurl:loadpsb.php?id= inurl:ages.php?id= inurl:material.php?id= inurl:clanek.php4?id= inurl:announce.php?id= inurl:chappies.php?id= inurl:read.php?id= inurl:viewapp.php?id= inurl:viewphoto.php?id= inurl:rub.php?idr= inurl:galeri_info.php?l= inurl:review.php?id= inurl:iniziativa.php?in= inurl:curriculum.php?id= inurl:labels.php?id= inurl:story.php?id= inurl:look.php?ID= inurl:newsone.php?id= inurl:aboutbook.php?id= inurl:material.php?id= inurlpinions.php?id= inurl:announce.php?id= inurl:rub.php?idr= inurl:galeri_info.php?l= inurl:tekst.php?idt= inurl:newscat.php?id= inurl:newsticker_info.php?idn= inurl:rubrika.php?idr= inurl:rubp.php?idr= inurlffer.php?idf= inurl:art.php?idm= inurl:title.php?id= inur...
Read more...

Seven layers of OSI

2 comments
The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers. Control is passed from one layer to the next, starting at the application layer in one station, proceeding to the bottom layer Let’s take a practical example so that we understand it better. Layer 7 = Application Layer You open your Internet browser and type in the name of the website of your target which you want to visit. Layer 6 = Presentation Layer Your browser knows how to show pictures from different format, such as JPG, PNG… Your browser knows how to handle different...
Read more...

Man in the browser (MITB) attacks

1 comments
Man-in-the-Browser (MitB), a form of Internet threat related to Man-in-the-Middle (MitM), is a trojan that infects a web browser and has the ability to modify pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host application. A MitB attack will be successful irrespective of whether security mechanisms such as SSL/PKI and/or Two or Three Factor Authentication solutions are in place. The only way to counter a MitB attack is by utilising transaction verification. The MitB Trojan works by utilising common facilities...
Read more...

LDAP Injection

1 comments
What is LDAP: LDAP is a protocol that facilitates the location of organizations, individuals and other resources in a network. It is a streamlined version of DAP (Directory Access Protocol), which is part of X.500, a standard for network directory services. The Lightweight Directory Access Protocol (LDAP) provides a mechanism for connecting to, searching, and modifying internet directories. LDAP statements (or Queries) used to retrieve data from information directories. What is LDAP Injection: LDAP injection is a specific form of attack that can be employed to compromise Web sites that...
Read more...

Cloud Computing

11 comments
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing storage, memory, processing and bandwidth. A simple example of cloud computing is Yahoo email or Gmail etc. You dont need a software or a server to use them. All a consumer would need is just an internet connection and you can start sending...
Read more...

How to put your PC clean and Maintain privacy

1 comments
The software which i used to clean temporary files and make your system privacy i will use the tool called CCLEANER To download the ccleaner ClickH...
Read more...

Understanding Denial-of-Service Attacks

0 comments
What is a denial-of-service (DoS) attack? In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer. The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular website...
Read more...

Online tools for hacking

0 comments
PICTURE To ASCII Convert - http://picascii.com Whois - IP Address - Domain Name Lookup - http://cqcounter.com/whois/ AdHoc IP Tools http://tatumweb.com/iptools.htm Ben's Web Utilities http://www.phaster.com/find_info_net_traffic.html central OPS http://centralops.net/co/ dihe's IP Index http://ipindex.homelinux.net/index.php? Domain Tools http://www.domaintools.com/ Global Whois Search http://www.ratite.com/whois/whois.html Multi DNS Lookup (Bankes.com) http://www.bankes.com/nslookup.htm Network Solutions http://www.networksolutions.com/whois/index.jsp Public DNS Servers List http://80.247.230.136/dns.htm BGPPlay...
Read more...

Tools used in Application Security & Penetration Testing

1 comments
In this article I’ll tell you, what tools are typically used in Application Security (in short AppSec) & Penetration Testing (in short PenTest). 1. Foot-printing Tools : SamSpade, NSlookup, dig, whois, Netcraft, ike-scan, ping, tracert / traceroute, HTTPrint,P0f etc. 2. Port Scanning Tools : Nmap, Super Scan. 3. Packet Crafting Tools : Hping 2. 4. Web Application Scanning Tools : Acunetix, HP WebInspect, AppScan, Nikto,wikto, NStaker,Core-impact. 5. Application/Network Vulnerability Scanning Tools : Retina, Nessus, Core-impact, ike-probe, GFI-Languard, IPLocks VA (DataBase), App Detective...
Read more...

Motivational Lines

0 comments
Koshish Karne Walon Ki Her Nahin Hoti Lahron Se Dar Kar Nauka Par Nahin Hoti Koshish Karne Walon Ki Her Nahin Hoti Nanhi Chiti Jab Dana Lekar Chalti Hai Chadhti Deewaron Par Sau Bar Phislati Hain Man Ka Viswas Ragon Mein Sahas Bharta Hain Chadhkar Girna Girkar Chadhna Na Akharta Hain Akhir Uski Mehnat Bekar Nahin Hoti Koshis Karne Walon Ki Her Nahin Hoti Dubkiyan Sindhu Mein Gotakhor Lagata Hain Ja Jakar Khali Haath Laut Aata Hain Milte Nahin Sahaj Hi Moti Gahre Pani Mein Badhta Duna Utsah Isi Hairani Mein Muthi Uski Khali Her Bar Nahi Hoti Koshis Karne Walon Ki Her Nahin Hoti Asaflta Ek...
Read more...