Sunday, September 11, 2011

Guide to Facebook Security

 

In case you’re not sure your account is fully protected, you can download the official Facebook security guide that has just been released by Facebook. This 14 pages e-book, written by former Senior Director of Internet Safety at Symantec Linda McCarthy, offers a few tips on how to make your Facebook account secure.


Guide_to_Facebook_Security.pdf
File size: 1.42 MB

Saturday, September 10, 2011

Apache Server 2 Bible HUNGRY MINDS

Wednesday, August 17, 2011

SQL Injection Tutorial With Havij


According to a survey the most common technique of hacking a website is SQL Injection. SQL Injection is a technique in which hacker insert SQL codes into web Forum to get Sensitive information like (User Name , Passwords) to access the site and Deface it. The traditional SQL injection method is quite difficult, but now a days there are many tools available online through which any script kiddie can use SQL Injection to deface a webite, because of these tools websites have became more vulnerable to these types of attacks.

One of the popular tools is Havij, Havij is an advanced SQL injection tool which makes SQL Injection very easy for you, Along with SQL injection it has a built in admin page finder which makes it very effective.


Supported Databases With Havij

  • MsSQL 2000/2005 with error.
  • MsSQL 2000/2005 no error union based
  • MySQL union based
  • MySQL Blind
  • MySQL error based
  • MySQL time based
  • Oracle union based
  • MsAccess union based
  • Sybase (ASE)

Demonstration

Now i will Show you step by step the process of SQL injection.

Step1: Find SQL injection Vulnerability in tour site and insert the string (like http://www.target.com/index.asp?id=123) of it in Havij as show below.



Step3: Now click on the Analyze button as shown below.



Now if the your Server is Vulnerable the information about the target will appear and the columns will appear like shown in picture below:


Step4: Now click on the Tables button and then click Get Tables button from below column as shown below:


Step5: Now select the Tables with sensitive information and click Get Columns button.After that select the Username and Password Column to get the Username and Password and click on the Get Table button.

Countermeasures: 

Here are some of the countermeasures you can take to reduce the risk of SQL Injection

1.Renaming the admin page will make it difficult for a hacker to locate it

3.Use a Intrusion detection system and compose the signatures for popular SQL injection strings

4. One of the best method to protect your website against SQL Injection attacks is to disallow special characters in the admin form, though this will make your passwords more vulnerable to bruteforce attacks but you can implement a capcha to prevent these types of attack.

Wednesday, August 10, 2011

Do you want the old facebook chat back?

http://www.starthack.com/wp-content/uploads/2011/07/picture-6.png
most of us do not enjoy this newly introduced facebook chat as its long with unnecessary stuff, like people offline. if you are a fun of facebook old chat, you can always get it back..
With the use of facebook chat disabler extension, you can switch back permanently from the newly introduced facebook chat to the old one.  
choose the browers you want to install the extension to and follow the link...

thnk you!!!

Friday, August 5, 2011

HACK IN TO YOUR FRIEND'S COMPUTER IN LESS THAN 10 MINUTES WITH METASPLOIT

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7kJC6jmGsLx9yUG4UCTK75XnZM6rScraV9shpAXI8YIIqUJ_He4V4R2VmYfXTK_nuT921tq7HjUl5KT8O6KNs68S0oK4dvx1nePnRKutoZPbLqx1Q9V0V3F8dSJDMWu6okn76gvm5mna/s640/metasploit-logo.png

The MSF is an open-source tool, which provides a framework for security researchers to develop exploits, payloads, payload encoders, and tools for reconnaissance and other security testing purposes. Metasploit is a hacker's best friend, mainly cause it makes the job of exploitation and post-exploitation a lot easier compared to other traditional methods of hacking

 The video shows you how to use metasploit


For more information on using the metasploit, you download and read the book which explains in detailed on using the metasploit.


DOWNLOAD

MSF_final.pdf