• How to check for SQL injection vulnerabilities

    Securing your website and web applications from SQL Injection involves a three-part process: Analysing the present state of security present by performing a thorough audit of your website and web applications for SQL Injection and other hacking vulnerabilities. Making sure that you use...
  • SQL Injection Hacks

    sql injection hacks Most common injection : ' OR ''=' Live example click http://fsmdc.fsm.ac.in/pgdmresult.asp now enter ' OR ''=' n watch it vomit d database.. i myself gave d CAT dis year n found almost 8 out of 10 Indian MBA college sites are vulnerable. watch full...
  • Denial Of Service Attacks

    1. Definitions We begin by defining Denial of Service and Distributed Denial of Service. 1.1 What is a DoS? As the name implies, DoS is a Denial of Service to a victim trying to access a resource. In many cases it can be safey said that the attack requires a protocol flaw as well as some kind of...
  • My Website is infected with Malware - What's next?

    Legitimate websites are being targeted for malware infections. Reason, large number of users visit their websites and hence these websites can be misused to easily spread or distribute malware to large number of users. If a website is infected with malware it may belong to one of the following...
  • What is ethical hacking?

    First of all we need to know that what is ethical hacker? An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as...
  • Bold and Underline letters in Facebook Chat

    Do you know you can use bold and underline letters in facebook chat. Follow these steps to do this.:- Use Bold Letters - To use bold letters type your letters between * . If you want to post HI in bold letter then type it like this in facebook chat *HI* then...
Latest entries

Thursday, January 10, 2013

ABORT -- abort the current transaction ALTER DATABASE -- change a database ALTER GROUP -- add users to a group or remove users from a group ALTER TABLE -- change the definition of a table ALTER TRIGGER -- change the definition of a trigger ALTER USER -- change a database user account ANALYZE -- collect statistics about a database BEGIN -- start a transaction block CHECKPOINT -- force a transaction...

Monday, July 23, 2012

 The Biggest Hacking Mania has arrived - 'The Hackers Conference 2012'.  In this first of its kind conference in India, Blackhat hackers drawn from around the world will demonstrate how they access a victim's personal information, and even confidential data available on the Android cell phone. The conference will be held on July 29 at the India Habitat Centre in New...

Wednesday, December 28, 2011

1. Nmap Nmap  is a free open source utility for network exploration or security auditing. Its design to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running,...

Thursday, December 15, 2011

sql injection hacks Most common injection : ' OR ''=' Live example click http://fsmdc.fsm.ac.in/pgdmresult.asp now enter ' OR ''=' n watch it vomit d database.. i myself gave d CAT dis year n found almost 8 out of 10 Indian MBA college sites are vulnerable. watch full description below. regards Rahul Dutt Avasthy Cyber Security Consultant SYNTAX REFERENCE, SAMPLE ATTACKS...