Monday, October 21

Basic SQL Injection using login Queries



Hy friends in my previous tutorial i show you how to use google dorks to find vulnerable websites. In this tutorial i will show you, how to hack a vulnerable website using basic SQL injection 
                                                                Here are the following dork which is used in this tutorial.

Google Dorks:
inurl:/adminlogin.aspx
inurl:/admin/index.php
inurl:/administrator.php
inurl:/administrator.asp
inurl:/login.asp
inurl:/login.aspx
inurl:/login.php
inurl:/admin/index.php
inurl:/adminlogin.aspx




~~~~~~~~~~

POSTED BY
~~~~~~~~~~
hackerz_on_mig

Wednesday, October 16

How to Find a Vulnerable Website using Google Dorks[SQL injection]

Hy friends today i m going to show you how to find a vulnerable website for website hacking using Google dorks is SQL injection. So the first question is put up in our mind that what is SQL injection?


~~~~~~~~~~~~~~~~~~~~~~~
WHAT IS SQL INJECTION ?
~~~~~~~~~~~~~~~~~~~~~~~

SQL injection is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a back-end database. Hacker/Cracker take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands inside these parameters. The result is that the attacker can execute arbitrary SQL queries and/or commands on the backend database server through the Web application.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
FINDING VULNERABLE WEBSITE 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Small List of Google Dork:


inurl:/index.php?id=

inurl:/gallery.php?id=

inurl:/post.php?id=

inurl:/article?id=

Defination Cracker Vs Hacker



* In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.
* The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.
*While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks.

Sunday, October 6

Cradl3 0f Flood3r v1 cracked by hackerz_on_mig
























* For any information contact with ID
   hackerz_on_mig



~~~~~~~~~
FEATURES
~~~~~~~~~
* Unlimited IDS logging
* Fast Logging
* Shadow roll
* Leave Shadow
* Enter Leave roll