Sunday 25 May 2014

6 WAYS TO HACK ANd DEFACE A WEBSITE ONLINE

Hello friends , today i will explain all the methods that are being used to hack a website or websites database. This is the first part of the hacking websitestutorial where i will explain in brief all methods for hacking or defacing websites. Today I will give you the overview and in later tutorials we will discuss them one by one with practical examples. So guys get ready for first part of Hacking websites class.... Don't worry i will also tell you how to protect your websites from these attacks and other methods like hardening of SQL and hardening of web servers and key knowledge about CHMOD rights that what thing should be give what rights... Note : This post is only for Educational Purpose only. What are basic things you should know before website hacking? First of all everything is optional as i will start from very scratch. But you need atleast basic knowledge of following things.. 1. Basics of HTML, SQL, PHP. 2. Basic knowledge of Javascript. 3. Basic knowledge of servers that how servers work. 4. And most important expertize in removing traces otherwise u have to suffer consequences. Now First two things you can learn from a very famous websitefor basics of Website design withbasics of HTML,SQL,PHP and javascript. http://www.w3schools.com/ And for the fourth point that you should be expert in removing traces. I will explain this in my future articles. So keep reading.. or simply subscribe my posts.. As we know traces are very important. Please don't ignore them otherwise you can be in big trouble for simply doing nothing. so please take care of this step. METHODS OF HACKING WEBSITE: 1. SQL INJECTION 2. CROSS SITE SCRIPTING 3. REMOTE FILE INCLUSION 4. LOCAL FILE INCLUSION 5. DDOS ATTACK 6. EXPLOITING VULNERABILITY. 1. SQL INJECTION First of all what is SQL injection? SQL injection is a type of security exploit or loophole in which a attacker "injects" SQL code through a web form or manipulate the URL's based on SQL parameters. It exploits web applications that use client supplied SQL queries. The primary form of SQL injectionconsists of direct insertion of code into user-input variables that are concatenated with SQL commands and executed. A less direct attack injects malicious code into strings that are destined for storage in a table or as metadata. When the stored strings are subsequently concatenated into a dynamic SQL command, the malicious code is executed. 2. CROSS SITE SCRIPTINGCross site scripting (XSS) occurs when a user inputs malicious data into a website, which causes the application to do something it wasn’t intended to do. XSS attacks are very popular and some of the biggest websites have been affected by them including the FBI, CNN, Ebay,Apple, Microsft, and AOL. Some website features commonly vulnerable to XSS attacks are: • Search Engines • Login Forms • Comment Fields Cross-site scripting holes are web application vulnerabilities that allow attackers to bypass

No comments:

Post a Comment