Posts

Showing posts from October, 2017

Windows Hacking : Injecting a Backdoor into a Portable Executable File

Image
Injecting a Backdoor into a Portable Executable File Tutorial Requirements: Veil Evasion: https://github.com/Veil-Framework/Veil-Evasion Metasploit on Kali Linux Windows Machine to emulate the victim Smart Bind –>> is a tool that’s going to bind the payload with the real program which you can download from here . Tutorial Guidelines: Step 1: Generate Veil Evasion Payload Note : this step requires installing Veil Evasion first. · Start the tool by typing: >>>> ./ Veil Evasion We can see that the new version of Veil Evasion has added additional modules. We now have 50 different payloads. The tool is very simple to use; we’ll will start by listing all the available payloads by typing: >>>>  list  We’re going to  select number 34 , which is reverse_tcp  After choosing our payload type, we set the local host and local port: Set Pyherion to Y for Yes. this is for encryption  Set LHOST as your I

TYPE OF SQL INJECTION ATTACK

Image
THIS SECTION DESCRIBES THE FOLLOWING SQL INJECTION TECHNIQUES: AUTHORIZATION BYPASS USING THE SELECT COMMAND USING THE INSERT COMMAND USING SQL SERVER STORED PROCEDURES  1. AUTHORIZATION BYPASS The simplest SQL injection technique is bypassing logon forms. Consider the following web application code: SQLQuery = "SELECT Username FROM Users WHERE Username = ‘" & strUsername & "‘ AND Password = ‘" & strPassword & "‘" strAuthCheck = GetQueryResult(SQLQuery) If strAuthCheck = "" Then boolAuthenticated = False Else boolAuthenticated = True End If Here’s what happens when a user submits a username and password. The query will go through the Users table to see if there is a row where the username and password in the row match those supplied by the user. If such a row is found, the username is stored in the variable strAuthCheck, which indicates that the user should be authenticated. If there is no row that the user-sup

Introduction to SQL Injection

Image
What is SQL Injection? SQL Injection (Or SQLi for short) is a method of code injection into S tructured Q uery L anguage (SQL) databases. It exploits a security issue where a user's input is not correctly filtered, usually due to poorly coded query language interpreters. Consider this code: statement = "SELECT * FROM `members` WHERE `user` = '" + user + "';" The above statement selects the specified "user" from the "members" table. Do you see any problems with this? Consider the following input as a username: ' or 'x' = 'x When the database tries to pull up records of that username, this is the resulting query: SELECT * FROM `members` WHERE `user` = '' OR 'x'='x'; Now, as you can see, the username is actually completely blank contained within the '', but the following OR statement will return true, as 'x' always = 'x'. Due to this problem of i

Download Hacking tool and library for rookie

Image
Hello guy's, In today's post i will be sharing with guy's some useful Black-hat Hacking tool which is very very useful for beginners in hacking, Have been using this tool for the past few month, its a nice tool .This Tool can be used to password cracker, DDOS tool, email scraper, web spider, website hacking.This wonderful tool was develop by  hackerlord. Description Black-hat hacking tool to easily hack website, scrape email, port scanner, crack FTP password, launch DDOS attack, mysql injection, easily hijack website, web spider, website vulnerability scanner and social engineering tool. Features hacking tool email scraper facebook account hacking tool social engineering FTP password cracker web spider tool DDOS tool port scanner vulnerability scanner gmail account hacking tool easily shut a website down easily read and write data into a website database Download

Browse Blocked Sites Using Google Translate

Image
Hi guys, here i come with an awesome trick to unblock all blocked sites in school,college or workplace. I know that most of all colleges block many websites in their computer systems. They block video browsing sites, trick site, ethical hacking sites, photos sharing sites, magazine sites, games sites, some game blog and even some shopping sites etc.. I don’t know why college computer system administrators are blocking shopping sites, tricks sites and some useful sites. Yes, my college also in this list. They are blocking sites using a website which is called ‘ Cyberoam Network Security Appliances ‘. Cyberoam Network Security Appliances is blocking websites based on the website category. Their database contains only the main category of the sites. Means, they only noting the category of each website and blocking categories. For example, my blog anonymoushackingbytravis.blogspot.in was categorized in shopping category. Lol, I don’t know why we[ anonymoushackingbytravis.blogspot.in

Best Darknet Websites 2017

Image
Darknet Websites Links List 2017 – Now After a long time, We came up with a curious topic many of people ask me in E-mail. So Let’s, ready guys, We know that our Internet is full of stuff, sites, search engines, music, torrents, e-commerce and many things. But These are indexed by Search engines like Google, Bing & Yandex. On the other side, there are some of the sites which are hidden from the internet called Darknet Websites List Links or you can say (Deep Web Sites). People can refer these websites as different names like some of search on internet about tor links, onion links, darknet sites etc The main Credit of Deep web is going to Mike Bergman who derived this term in 2000. These websites are not indexed by Standard search engines like Google, Bing & Yandex. So these many of sites are involved in illegal activities to sell drugs, pistols and many of activities. Silk Road is one of the biggest example and a dark web marketplace to sell drugs. It is operated as TO

15 Best Android Hacking Apps of 2017

Image
In the era of android operating system, It really reduces our workload and we can down many of thing with the android smartphone in just a few clicks. So Guys, on the other hand, there is a black world of android apps that can be used by hackers to do illegal and strange activities. In technical language, there are lots of apps which are used to do hacking and other illegal stuff that against android’s policy. Our purpose is not to promote these apps but aware about these android hacking apps that these apps exist too. Many of android users not aware about these apps cause these are not available on google play store but you can find these apps on the internet freely. You can even search on internet about best android hacking apps and you can easily get these apps. Many of you guys heard about the top best android app of different categories but today we are going to show you the most notorious best android hacking apps available on internet and people are freely using that app

Delete Your Online Identity All In One Click

Image
Outlined by two Swedish developers, Wille Dahlbo and Linus Unnebäck, the site says it helps you ‘Clean up your reality’ by gathering every all the records and deleting them. On the off-chance that you ever feel like online life is getting excessively, there might be an answer. Deseat.me permits people to delete their online impression with the click of a button. All we need to is login with your Google account, it searches out all part of the records a client has made on the web. As Deseat.me uses the Google OAuth convention, it implies that it won’t have access to anybody’s login data, the main thing it finds are the accounts you need to delete GOOGLE'S OAUTH PROTOCOL OAuth is an open standard for authorization, regularly utilized as a route for web clients to sign into outsider sites utilizing their Microsoft, Google, Facebook (et cetera) accounts without uncovering their secret key It isn’t ideal, however. Deseat might have the capacity to discover the reco

Hack any Android Phone in Seconds

Image
In today's article we are going to talk about how to  Hacking Any Android Device Using AndroRAT App Binder,Usually any Android Device can be hacked using Metasploit Meterpreter attack but many people are not aware of that  process as it is not user friendly. But using a simple tool called AndroRAT (Android Remote Administration Tool) it is possible for anyone to hack any Android device. By successfully running this tool, one can retrieve the following information from target Android device. Download it from here . (To get the password leave a comment) Get contacts (and all theirs information) Do vibrate the phone Get call logs Open an URL in the default browser Get all messages Send a text message Location by GPS/Network Do a toast Monitoring received messages in live Streaming video (for activity based client only) Monitoring phone state in live (call received, call sent, call missed..) Stream sound from microphone (or other sources..) Take a picture from