Latest entries
Thursday, January 10, 2013
ABORT -- abort the current transaction
ALTER DATABASE -- change a database
ALTER GROUP -- add users to a group or remove users from a group
ALTER TABLE -- change the definition of a table
ALTER TRIGGER -- change the definition of a trigger
ALTER USER -- change a database user account
ANALYZE -- collect statistics about a database
BEGIN -- start a transaction block
CHECKPOINT -- force a transaction...
Monday, July 23, 2012
The Biggest Hacking Mania has arrived
- 'The Hackers Conference 2012'. In
this first of its kind conference in India, Blackhat hackers drawn from around
the world will demonstrate how they access a victim's personal information, and
even confidential data available on the Android cell phone. The conference will
be held on July 29 at
the India Habitat Centre in
New...
Wednesday, December 28, 2011

1. Nmap
Nmap is a free open source utility for network exploration or security auditing. Its design to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running,...
Thursday, December 15, 2011
sql injection hacks Most common injection : ' OR ''='
Live example
click
http://fsmdc.fsm.ac.in/pgdmresult.asp
now enter
' OR ''='
n watch it vomit d database..
i myself gave d CAT dis year n found almost 8 out of 10 Indian MBA college sites are vulnerable.
watch full description below.
regards
Rahul Dutt Avasthy
Cyber Security Consultant
SYNTAX REFERENCE, SAMPLE ATTACKS...
Subscribe to:
Posts (Atom)