Hello friends , today i will explain all the
methods that are being used to hack a
website or websites database. This is the
first part of the hacking websitestutorial
where i will explain in brief all methods for
hacking or defacing websites. Today I will
give you the overview and in later tutorials
we will discuss them one by one with
practical examples. So guys get ready for first
part of Hacking websites class.... Don't worry i
will also tell you how to protect your
websites from these attacks and other
methods like hardening of SQL and
hardening of web servers and key
knowledge about CHMOD rights that what
thing should be give what rights...
Note : This post is only for Educational
Purpose only.
What are basic things you should know
before website hacking?
First of all everything is optional as i will start
from very scratch. But you need atleast basic
knowledge of following things..
1. Basics of HTML, SQL, PHP.
2. Basic knowledge of Javascript.
3. Basic knowledge of servers that how
servers work.
4. And most important expertize in removing
traces otherwise u have to suffer
consequences.
Now First two things you can learn from a
very famous websitefor basics of Website
design withbasics of HTML,SQL,PHP and
javascript.
http://www.w3schools.com/
And for the fourth point that you should be
expert in removing traces. I will explain this
in my future articles. So keep reading.. or
simply subscribe my posts..
As we know traces are very important. Please
don't ignore them otherwise you can be in
big trouble for simply doing nothing. so
please take care of this step.
METHODS OF HACKING WEBSITE:
1. SQL INJECTION
2. CROSS SITE SCRIPTING
3. REMOTE FILE INCLUSION
4. LOCAL FILE INCLUSION
5. DDOS ATTACK
6. EXPLOITING VULNERABILITY.
1. SQL INJECTION
First of all what is SQL injection? SQL injection
is a type of security exploit or loophole in
which a attacker "injects" SQL code through a
web form or manipulate the URL's based on
SQL parameters. It exploits web applications
that use client supplied SQL queries.
The primary form of SQL injectionconsists of
direct insertion of code into user-input
variables that are concatenated with SQL
commands and executed. A less direct attack
injects malicious code into strings that are
destined for storage in a table or as
metadata. When the stored strings are
subsequently concatenated into a dynamic
SQL command, the malicious code is
executed.
2. CROSS SITE SCRIPTINGCross site scripting
(XSS) occurs when a user inputs malicious
data into a website, which causes the
application to do something it wasn’t
intended to do. XSS attacks are very popular
and some of the biggest websites have been
affected by them including the FBI, CNN,
Ebay,Apple, Microsft, and AOL.
Some website features commonly vulnerable
to XSS attacks are:
• Search Engines
• Login Forms
• Comment Fields
Cross-site scripting holes are web application
vulnerabilities that allow attackers to bypass
No comments:
Post a Comment